This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Corporate Supporter Bios"

From OWASP
Jump to: navigation, search
(updated scsk bio)
 
(256 intermediate revisions by 7 users not shown)
Line 1: Line 1:
 
Disclaimer: Corporate Supporter Bios are not endorsements and reflect the message of the supporter only.
 
Disclaimer: Corporate Supporter Bios are not endorsements and reflect the message of the supporter only.
{|class="wikitable"
+
 
 +
== '''Elite Corporate Members''' ==
 +
{| class="wikitable"
 +
|-
 +
| {{MemberLinksv2|link=https://www.allstate.com/|logo=All line hor tag cmyk pos.jpg}} ||Allstate Corporation is the largest publicly held personal lines property and casualty insurer in America, serving more than 16 million households nationwide.  Founded in 1931, Allstate has been dedicated to protecting our customers from life’s uncertainties and preparing them for the future for more than 85 years.  As the needs of our customers evolve, so does our technology and security practices to ensure our customers remain in good hands. ||https://www.allstate.com/
 +
|-
 +
| {{MemberLinksv2|link=https://www.pwc.co.uk/cybersecurity|logo= Pwc.png}} ||Our purpose is to build trust in society and solve important problems. In today's digital world that requires a focus on cybersecurity in order to build a secure digital society. We help clients across society to understand their cybersecurity risk; build and assure their defenses; identify and respond to attacks, and to navigate the complex legal and regulatory environment for cybersecurity. For more information please visit www.pwc.co.uk/cybersecurity ||http://www.pwc.co.uk/cybersecurity
 +
|}
 +
 
 +
== '''Premier Corporate Members''' ==
 +
{| class="wikitable"
 
| align="center" style="background:#f0f0f0;" scope="col" width="100" | '''Company'''  
 
| align="center" style="background:#f0f0f0;" scope="col" width="100" | '''Company'''  
 
| align="center" style="background:#f0f0f0;" scope="col" width="1000" | '''Company Description'''
 
| align="center" style="background:#f0f0f0;" scope="col" width="1000" | '''Company Description'''
 
| align="center" style="background:#f0f0f0;" scope="col" width="100" | '''Contact'''
 
| align="center" style="background:#f0f0f0;" scope="col" width="100" | '''Contact'''
 
|-
 
|-
| {{MemberLinks|link=http://www.accuvant.com|logo=Accuvant_150x45.png‎|size=150x45px}} ||Accuvant is a leading provider of information security services and solutions serving enterprise-class organizations across North America. The company offers a full suite of service capabilities to help businesses, governments and educational institutions define their security strategies, identify and remediate threats and risks, select and deploy the right technology and achieve operational readiness to protect their organizations from malicious attack. Headquartered in Denver, Colorado, Accuvant has offices across the United States and Canada. Founded in 2002, Accuvant has been named to the Inc. 500/5000 list of fastest growing companies for the last seven consecutive years. For more information about Accuvant, visit Accuvant’s website at www.accuvant.com.||http://www.accuvant.com
+
| {{MemberLinksv2|link=http://www.adobe.com|logo=Adobe_logo_standard_for_Tasha.jpg|size=300px90px}} ||Adobe is the global leader in digital marketing and digital media solutions. Our tools and services allow our customers to create groundbreaking digital content, deploy it across media and devices, measure and optimize it over time, and achieve greater business success. We help our customers make, manage, measure, and monetize their content across every channel and screen. ||http://www.adobe.com/
 +
|-
 +
|{{MemberLinksv2|link=https://www.hackerone.com/|logo=HackerOne_Logo_.jpg}} ||HackerOne (www.hackerone.com) is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More than 1,000 organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Square, Starbucks, Dropbox and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities. HackerOne customers have resolved over 57,000 vulnerabilities and awarded over $22M in bug bounties. HackerOne is headquartered in San Francisco with offices in London and the Netherlands. ||https://www.hackerone.com/
 +
|-
 +
| |{{MemberLinksv2|link=https://www.netsparker.com/|logo=Netsparker-logo-transparent-h1000px-color.png}} ||Netsparker develops an industry leading automated web application security scanner. Available as Windows desktop software and as a Cloud service, the Netsparker scanner is very easy to use and its proof-based vulnerability scanning technology enables you to easily and automatically detect SQL Injection, Cross-site scripting and other vulnerabilities in your websites, web applications and web services. Netsparker’s unique scanning, detection and auto exploitation techniques allow it to be dead accurate. Therefore you do not have to waste time manually verifying the scanner’s findings and instead can focus on fixing the identified vulnerabilities. Netsparker is trusted and used by world renowned companies such as Samsung, Ernst & Young, Skype, NASA, ISACA and ING Bank.  || https://www.netsparker.com
 +
|-
 +
| {{MemberLinksv2|link=http://www.qualys.com|logo=Qualys-1_-_small_(2).jpg}} || Qualys is a pioneer and leading provider of cloud-based security and compliance solutions. The Qualys Cloud Platform and its integrated apps - including Web Application Scanning (WAS) - help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence and automating the full spectrum of auditing, compliance, and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).||https://www.qualys.com
 +
|-
 +
| {{MemberLinksv2|link=https://www.salesforce.com/|logo=Salesforce_logo.png|size=300px90px}} ||Salesforce is the world’s #1 customer relationship management (CRM) platform. Our cloud-based applications for sales, service, marketing, and more don’t require IT experts to set up or manage — simply log in and start connecting to customers in a whole new way. ||https://www.salesforce.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.acunetix.com|logo=Acunetix_logo_200.png‎|size=150x45px}} ||Acunetix’s team of experienced engineers developed a lead in website, web application, and Internet-facing server analysis and vulnerability detection. Available both on-premise and online, Acunetix uses deep crawling techniques to detect exploitable vulnerabilities such as SQL injection, and all forms of Cross-Site scripting – while providing concise vulnerability reports and information on how to fix them allowing you to protect your business against impending hacker attacks. Acunetix customers include Cisco, NASA, American Express, Sony, HSBC, The Pentagon, Skype, and many more. You can find us online at www.acunetix.com.||http://www.acunetix.com
+
| {{MemberLinksv2|link=http://www.signalsciences.com|logo= Sigsci-logo_primary_(1).png|size=300px90px}} ||Signal Sciences secures the most important web applications, APIs, and microservices of the world's leading companies. Our next-gen WAF and RASP help you increase security and maintain site reliability without sacrificing velocity, all at the lowest total cost of ownership. Learn how our patented approach can help you. ||http://www.signalsciences.com
 +
|-
 +
|||||
 +
|-
 +
|}
 +
 
 +
==''' Contributor Corporate Members '''==
 +
{| class="wikitable"
 +
| align="center" style="background:#f0f0f0;" scope="col" width="100" | '''Company'''
 +
| align="center" style="background:#f0f0f0;" scope="col" width="1000" | '''Company Description'''
 +
| align="center" style="background:#f0f0f0;" scope="col" width="100" | '''Contact'''
 +
|- '
 +
 
 
|-
 
|-
| {{MemberLinks|link=http://www.adobe.com|logo=Adobe_logo_standard_for_Tasha.jpg|size=300px90px‎|size=150x45px}} ||Adobe is the global leader in digital marketing and digital media solutions. Our tools and services allow our customers to create groundbreaking digital content, deploy it across media and devices, measure and optimize it over time, and achieve greater business success. We help our customers make, manage, measure, and monetize their content across every channel and screen. ||http://www.adobe.com/
+
| {{MemberLinksv2|link=http://www.acunetix.com|logo=Acunetix_logo_200.png‎|size=150x45px}} ||Acunetix’s team of experienced engineers developed a lead in website, web application, and Internet-facing server analysis and vulnerability detection. Available both on-premise and online, Acunetix uses deep crawling techniques to detect exploitable vulnerabilities such as SQL injection, and all forms of Cross-Site scripting – while providing concise vulnerability reports and information on how to fix them allowing you to protect your business against impending hacker attacks. Acunetix customers include Cisco, NASA, American Express, Sony, HSBC, The Pentagon, Skype, and many more. You can find us online at www.acunetix.com.||http://www.acunetix.com
 
|-
 
|-
| {{MemberLinksv2|link=http://www.akamai.com|logo=Akamai_Logo_resized.png‎|size=150x45px}} || ||http://www.akamai.com
+
|{{MemberLinksv2|link=http://www.altitudenetworks.com/|logo=Altitude_Networks.jpg}} ||Altitude Networks tackles data security in the cloud to protect enterprises against unauthorized data access, accidental or malicious sharing to unintended individuals, and data theft.||http://www.altitudenetworks.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.arxan.com|logo=Arxan_Logo_for_OWASP-_Resized.jpg‎‎|size=150x45px}} ||Arxan protects the App Economy from attacks in distributed or untrusted environments with the world's strongest and most deployed application integrity protection products. Among today’s diverse computing platforms, mobile and tablet apps and packaged or embedded software are all exposed to hacking attacks such as reverse-engineering, tampering, insertion of malware/exploits, repackaging, fraud, intellectual property theft, and piracy. Arxan's unique patented Guarding technology enables sensitive or high-value applications to proactively guard their own integrity by defending, detecting, alerting, and reacting to hacking attacks through a risk-based, customized protection. Arxan’s self-defending and tamper-proof applications are deployed on more than 200 million devices by leading Fortune 500 organizations in high-tech, ISV, financial services, digital media, gaming, healthcare, and other industries. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. Visit us at www.arxan.com. || http://www.arxan.com
+
|{{MemberLinksv2|link=https://aon.com/cyber-solutions|logo=Aon_Logo_Red_Tagline_RGB_-_Edited.png}} ||Aon’s Cyber Solutions offers holistic cyber security, risk and insurance management, investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.
 +
Cyber security services provided by Stroz Friedberg Limited and its affiliates. Cyber risk services provided by Aon UK Limited and its affiliates
 +
| https://aon.com/cyber-solutions
 
|-
 
|-
| {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_Logo.png‎‎|size=150x45px}} ||Aspect Security, founded in 2002, is a consulting firm focused exclusively on application security products and services. We help ensure that the software that drives business is protected against hackers. Aspect’s Security Engineers analyze, test and validate approximately 5,000,000 lines of code a month, most of which are critical to the national infrastructure. Our work unearths over 10,000 vulnerabilities every year across a wide range of technologies and architectures. Our recommendations dramatically improve our clients’ security posture. We support a worldwide clientele with critical applications in the government, defense, financial, healthcare, services and retail sectors. Our educational division has taught tens of thousands of people around the world how to build, test, and deploy secure applications, making us a world leader in application security training. Flexible delivery options include instructor-led training either in-person or via webcast, or, on-demand through our innovative eLearning curriculum. Aspect Security’s principals are pioneers in the field, having started one of the world’s first application security practices in 1998. They conceived of several industry-leading standards, such the OWASP Top Ten, WebGoat, the Application Security Verification Standard (ASVS), Risk Rating Methodology and Enterprise Security API (ESAPI). These free and open materials are downloaded over 50,000 times a month. We are a founding member of the Open Web Application Security Project (OWASP) in support of educating organizations about the ever-changing threat landscape and how to properly build and secure applications.  Headquartered in Columbia, MD, our personnel are located throughout the United States serving our worldwide clientele. ||https://www.aspectsecurity.com
+
|{{MemberLinksv2|link=https://www.arxan.com/|logo=Arxan-logo-stacked_tagline_CMYK.png}} ||Arxan, the global trusted leader of application protection solutions, delivers the confidence to build, deploy, and manage an organization’s most innovative and valuable applications. Currently protecting more than 1 billion application instances across industries including financial services, mobile payments, healthcare, automotive, gaming, and entertainment, the company provides the industry’s most comprehensive application protection solution. Unlike legacy security providers that rely on perimeter-based barriers to keep bad actors out, Arxan protects applications at the source and binary code level to expand the area of trust and provides a broad range of enterprise services and patented security capabilities such as code hardening, obfuscation, encryption, and Whitebox cryptography. Founded in 2001, the company is headquartered in North America with global offices in EMEA and APAC. ||https://www.arxan.com/
 
|-
 
|-
We support a worldwide clientele with critical applications in the government, defense, financial, healthcare, services and retail sectors.
+
|{{MemberLinksv2|link=https://avatao.com/|logo=Avataologo_blue.png}} ||Avatao is an online training platform for building secure software. It offers a rich library of hands-on IT security exercises for software engineers to teach secure programming from design to deployment in a fun and intuitive way. Educating for secure software can significantly improve software quality, increase trust in a company’s brand, reduce development costs and reduce the risks of suffering significant losses from cyber-attacks. In today’s world, secure software development practices are a basic requirement and we believe the solution should be integrated into the ground roots of software development teams. The platform can be used to provide security awareness to software engineers, to enrich existing IT security training, meetups or allow self-directed learning for continuous professional development. Avatao hackathons are also an excellent method to discover talented developers and engage and build brand awareness in the community. Avatao is a creation out of CrySyS Lab, world-renowned experts in IT security. Learning communities like business teams use Avatao for an improved and efficient learning experience. Mid-size and large software and financial companies use Avatao’s gamified online training to organize security hackathons, onboard new hires or upskill software developers to build secure software. The Avatao platform was publicly launched in 2016 for end-users and business customers. Initial customers include LogMeIn (US), Prezi (HU), Microsec (HU), Emarsys (HU), Photobox (UK), and many other companies are piloting the platform including Fortune 100 companies. Avatao currently has 5000+ users and 500+ exercises. ||https://avatao.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.astechconsulting.com|logo=Astech.jpg‎|size=150x45px}} ||AsTech has been helping companies manage Internet risk since 1997 - from vulnerability discovery through optimizing a Secure Software Development Lifecycle. By understanding our clients’ unique risk appetites and business objectives, our processes bring strategic focus to application security initiatives.  AsTech provides source code security assessments, graybox vulnerability testing, source code risk remediation and secure development training.  We also offer process automation and integration services application security eco-systems - enabling communication between vulnerability scanners, WAFs, GRC platforms, and bug-tracking systems. We deliver scalable, customized solutions designed to meet your organization’s unique requirements. Visit: www.astechconsulting.com Call: 1.888.777.5995 Twitter: @AsTech_infosec LinkedIn: http://www.linkedin.com/company/astech-consulting ||http://www.astechconsulting.com
+
|{{MemberLinksv2|link=https://www.avinetworks.com|logo=Avi_logo_White_hiRes.jpg}} ||Avi Networks completes enterprises’ digital transformation with its software load balancer, intelligent Web Application Firewall, and modern application services. The Avi Vantage Platform is deployed across data centers and clouds, delivering better elasticity, intelligence, and cost savings by providing granular per-tenant and per-app services. Customers enjoy 5X faster application rollouts, actionable analytics, and 70% lower costs. ||https://www.avinetworks.com
 
|-
 
|-
| {{MemberLinks|link=http://www.autodesk.com|logo=Autodesk-logo-rgb-color-logo-black-text-medium.png|size=150x45px}} || || http://www.autodesk.com
+
| |{{MemberLinksv2|link=https://www.brinqa.com/|logo=Brinqa_Logo.png}} ||Brinqa is a leading provider of unified risk management – enabling stakeholders, governance organizations, and infrastructure and security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organization’s existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. With Brinqa, organizations are reducing response time to emerging threats, impact to the business, and technology risk and compliance costs by over 50% through real-time risk analytics, automated risk assessments, prioritized remediation, actionable insights, and improved communication. Founded in 2008 by industry leaders in risk management with a proven track record in delivering cutting edge, innovative and cost-effective solutions. Brinqa’s award-winning software and cloud services are trusted by fortune 500 companies across risk disciplines such as information technology risk, vendor risk, and regulatory compliance risk. Brinqa is headquartered in Austin, Texas and has a global presence. ||https://www.brinqa.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.bestbuy.com|logo=BestBuy_Logo_Resized.png|size=150x45px}}||Best Buy Co., Inc.(NYSE: BBY) is a leading multi-channel global retailer and developer of technology products and services. Every day our employees - 180,000 strong - are committed to helping deliver the technology solutions that enable easy access to people, knowledge, ideas and fun. We are keenly aware of our role and impact on the world, and we are committed to developing and implementing business strategies that bring sustainable technology solutions to our consumers and communities. For information about Best Buy, visit www.bby.com or to shop online please visit www.bestbuy.com||http://www.bestbuy.com
+
| {{MemberLinksv2|link=https://www.bugcrowd.com/|logo=Bugcrowd-logo-150-50.png}} || ||https://www.bugcrowd.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.blackducksoftware.com|logo=Black_Duck_Logo_150x34.png‎|size=150x45px}} ||Black Duck Software is the leading OSS Logistics solution provider, enabling enterprises of every size to securely manage open source code and optimize the opportunities that come with open source adoption and management. As part of the greater open source community, Black Duck connects developers to comprehensive open source software (OSS) resources through The Black Duck Open Hub (formerly Ohloh) and to the latest commentary from industry experts through the Open Source Delivers blog. Black Duck is headquartered in Boston and has offices in San Mateo, London, Paris, Frankfurt, Hong Kong, Tokyo, Seoul, and Beijing. For more information about how to leverage open source to deliver faster innovation, greater creativity, and improved efficiency, visit www.blackducksoftware.com and follow the company at @black_duck_sw. ||http://www.blackducksoftware.com
+
| {{MemberLinksv2|link=http://www.ca.com/us/default.aspx|logo=CA_logo_150x168px.jpg}} ||CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. Learn more at https://www.ca.com/us.html || https://www.ca.com/us.html
 
|-
 
|-
| {{MemberLinks|link=https://www.blackhat.com|logo=Blackhat-black.png‎|size=150x45px}} ||Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.
+
| |{{MemberLinksv2|link=https://www.cequence.ai/|logo=Cequence-logo-blue-horizontal-full_-_Edited.jpg}} || Cequence Security is a venture-backed cybersecurity software company founded in 2015 and based in Sunnyvale, CA. Its mission is to transform application security by consolidating multiple innovative security functions within an open, AI-powered software platform that protects customers web, mobile, and API-based applications – and supports today’s cloud-native, container-based application architectures. The company is led by industry veterans that previously held leadership positions at Palo Alto Networks and Symantec. Customers include F500 organizations across multiple vertical markets, and the solution has earned multiple industry accolades. Learn more at www.cequence.ai. ||https://www.cequence.ai/
||https://www.blackhat.com/
 
 
|-
 
|-
| {{MemberLinks|link=http://www.boozallen.com|logo=Bah-color.PNG‎|size=150x45px}} ||Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, Booz Allen is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. In the commercial sector, the firm focuses on leveraging its existing expertise for clients in the financial services, healthcare, and energy markets, and to international clients in the Middle East. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. The firm’s management consulting heritage is the basis for its unique collaborative culture and operating model, enabling Booz Allen to anticipate needs and opportunities, rapidly deploy talent and resources, and deliver enduring results. By combining a consultant’s problem-solving orientation with deep technical knowledge and strong execution, Booz Allen helps clients achieve success in their most critical missions—as evidenced by the firm’s many client relationships that span decades. Booz Allen helps shape thinking and prepare for future developments in areas of national importance, including cybersecurity, homeland security, healthcare, and information technology. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, 2012. Fortune has named Booz Allen one of its “100 Best Companies to Work For” for eight consecutive years. Working Mother has ranked the firm among its “100 Best Companies for Working Mothers” annually since 1999. More information is available at www.boozallen.com. (NYSE: BAH) ||http://www.boozallen.com
+
| |{{MemberLinksv2|link=https://www.checkmarx.com/|logo=Checkmarx-logo-2019-horizontal - Edited.png}} ||Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations. Checkmarx CxSAST is a highly accurate and flexible Source Code Analysis product that allows organizations to automatically scan a un-compiled/un-built code and identify hundreds of security vulnerabilities in the most prevalent coding languages. Learn more at www.checkmarx.com. ||https://www.checkmarx.com
 
|-
 
|-
| {{MemberLinksv2|link=http://www.ca.com/us/default.aspx|logo=CA_logo_150x168px.jpg}} ||CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. Learn more at ca.com || http://www.ca.com
+
| {{MemberLinksv2|link=http://codedx.com/|logo=CodeDx-logo (1) (1).png|size=150x45px}} ||Code Dx is committed to reducing barriers to effective application security. Our automated application vulnerability correlation and management tools help find and fix insecure code faster, with less effort and a smaller team. Focus your precious resources on developing valuable new features, and ship secure code faster and more often. For more information, please visit https://codedx.com/ ||https://codedx.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.checkmarx.com|logo=Checkmarx_logo_resized.png‎|size=150x45px}} ||Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions.The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities.Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The SAST solution streamlines the workflow of key stakeholders in the software development process, increasing their effectiveness in finding problems and reducing the need for costly professional services. The product enables developers and auditors to easily scan uncompiled / unbuilt code in all major coding languages anywhere, anytime. For CISOs, it means that securing applications in the enterprise is finally practical and achievable. Application security testing is available in both On Premise and On Demand configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security.Customers include multiple Fortune 500, government organizations and SMBs ||http://www.checkmarx.com
+
| {{MemberLinksv2|link=https://www.contrastsecurity.com/|logo=Contrast_Logo_New.jpg}} ||Contrast Security delivers the world’s fastest application security software that eliminates the single greatest security risk to enterprises today. Industry research shows that application security flaws are the leading source of data breaches. Contrast can be deployed, automatically discover applications and identify vulnerabilities within seven minutes. Relying on sensors instead of expensive security experts, Contrast runs continuously and is 10 times more accurate than the competition. Unlike tedious, painful and slow legacy approaches, Contrast analyzes a complete portfolio of running applications simultaneously in real-time at any scale. As a result, organizations can act faster against threats and immediately reduce risk. More information on Contrast Security can be found at http://www.contrastsecurity.com/. || http://www.contrastsecurity.com/
|-
 
| {{MemberLinks|link=http://www.cigital.com|logo=Cigital_OWASP.GIF‎|size=150x45px}} ||Cigital, Inc. is the leading software security consulting firm in the world. Established in 1992, Cigital plans and implements initiatives that help organizations ensure their applications are secure and reliable while also improving how they build and deploy software. Our recognized experts apply a combination of proven methodologies, tools, and best practices to meet each client’s unique requirements. Cigital is headquartered outside Washington, D.C. with regional offices in the U.S., Europe, and India. ||http://www.cigital.com
 
 
|-
 
|-
| {{MemberLinks|link=http://www.cloudpassage.com|logo=Cloud_Passage_Logo.png‎|size=150x45px}} ||CloudPassage is the leading provider of public and private cloud infrastructure security and creator of Halo®, the industry's first security and compliance automation platform purpose-built for elastic cloud environments. Industry-leading companies like RightScale, MuleSoft, Taulia, Bandwidth.com, and Martini Media trust Halo to seamlessly automate infrastructure security and compliance with standards like PCI, FFIEC, and HIPAA. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital, Shasta Ventures, and other leading investors. For more information, please visit http://www.cloudpassage.com. || http://www.cloudpassage.com
+
| {{MemberLinksv2|link= https://www.cybozu.com/|logo=Cybozu_Logo_2017.png}} ||Cybozu is a Japanese cloud computing vendor founded in 1997. Its service supports effective team collaboration hence our services are widely used from large-scaled teams like multinational enterprises to small-scaled teams like volunteer groups, clubs even families. “kintone” is one of the Cybozu’s key products released in 2011. It is called "no-code application platform" which makes work more productive through business applications. It is recognized as one of the leading vendors in” Gartner 2016 Enterprise application Platform as a Service (aPaaS), Worldwide Magic Quadrant”. Cybozu has been focusing on security enhancement. It has started "bug bounty project" in 2013 to find any vulnerabilities which may exist in its product in order to provide its customers with the most secure service possible. || https://www.cybozu.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.coalfire.com/Services/Coalfire-Labs|logo=Coalfire_Labs_Logo_Resized.png‎|size=150x45px}} ||Coalfire Labs provides technical testing services that allow our clients to gain a deep understanding of the effectiveness of their security controls at all levels: across networks, applications, embedded devices, and people. Coalfire Lab’s highly skilled professionals combine best of breed assessment technology with unmatched analysis capabilities when performing application security analysis, penetration testing, social engineering or digital forensics. Coalfire Labs is a division of Coalfire Systems, a fast-growing IT Governance, Risk and Compliance (IT GRC) firm, serving as a trusted advisor and IT GRC tools-provider to security-conscious leaders in Retail, Financial Services, Healthcare, Hospitality, Higher Education, Government and Utilities. We help our clients recognize and control IT-related risks and maintain compliance with all major industry and government standards. ||http://www.coalfire.com/Services/Coalfire-Labs
+
|{{MemberLinksv2|link= https://www.delltechnologies.com/en-us/index.htm |logo=DellTech_Logo_resized.png}} || Dell Technologies (NYSE: DELL) unique family of businesses that helps organizations and individuals build their digital future and transform how they work and live. The company provides customers with the industry's broadest and most innovative technology and services portfolio spanning from edge to core to cloud.  The Dell Technologies family includes Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream and VMware. ||https://www.delltechnologies.com/en-us/index.htm
 
|-
 
|-
| {{MemberLinks|link=http://www.coverity.com|logo=Coverity_Logo.png‎|size=150x45px}} ||Coverity, Inc., a Synopsys company (Nasdaq:SNPS), is a leading provider of software quality and security testing solutions. Coverity’s award-winning development testing platform helps developers create and deliver better software, faster, by automatically testing source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic system failure. The world’s largest brands rely on Coverity to help ensure the quality, safety and security of their products and services. For more information, visit www.coverity.com, follow us on Twitter or check out our blog.|| http://www.coverity.com/
+
| {{MemberLinksv2|link=http://www.denimgroup.com|logo=Dg_logo_stacked_hires_-_Edited.png}} ||Denim Group is the leading independent application security firm, serving as a trusted advisor to customers on matters of application risk and security. The company helps organizations assess and mitigate application security risk. Denim Group’s flagship ThreadFix platform accelerates the process of application vulnerability remediation, reflecting the company’s rich understanding of what it takes to fix application vulnerabilities faster.||http://www.denimgroup.com
 
|-
 
|-
| {{MemberLinks|link=http://www.denimgroup.com|logo=Denim_Group_Logo.gif‎|size=150x45px}} ||Denim Group is a custom software development firm skilled in large-scale development projects across multiple platforms, languages and applications. What makes Denim Group unique is that the company brings significant core competencies in software security to the table, offering an innovative blend of secure software development, testing and training capabilities that protect a company’s biggest asset, its data. Denim Group customers span an international client base of commercial and public sector organizations across the financial services, banking, insurance, healthcare and defense industries. Its depth of experience building large-scale software development systems in a secure fashion has made the company's leaders recognized experts in their fields. Denim Group has been recognized as one of the 5,000 Fastest Growing Company's by Inc. Magazine several years in a row, and has won multiple awards including its recent accolades as one of the best places to work in San Antonio.||http://www.denimgroup.com
+
| {{MemberLinksv2|link=https://duo.com/|logo=Duo_Logo_-_Green_(1).png}} ||Duo Security helps defend organizations against data breaches by making security easy and effective. Duo Beyond, the company's category-defining zero-trust security platform, enables organizations to provide trusted access to all of their critical applications, for any user, from anywhere, and with any device. The company is a trusted partner to more than 10,000 customers globally, including Dresser-Rand, Etsy, Facebook, K-Swiss, Random House, Yelp, Zillow, Paramount Pictures, and more. Founded in Michigan, Duo has offices in Ann Arbor and Detroit, as well as growing hubs in Austin, Texas; San Mateo, California; and London, UK.||https://duo.com/
 
|-
 
|-
| {{MemberLinksv2|link=http://www.ddifrontline.com|logo=DDI_Logo_150x45.GIF|size=150x45px}} || ||http://www.ddifrontline.com
+
|{{MemberLinksv2|link=https://www.entrustdatacard.com/|logo=Entrust DataCard logo.png|size=150x45px}} ||Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates, and secure communications. With more than 2,000 Entrust Datacard colleagues around the world and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com. ||https://www.entrustdatacard.com/
 
|-
 
|-
| {{MemberLinksv2|link=https://www.edgescan.com|logo=Edgescan_logo.png|size=150x45px}} ||edgescan™, the "Digital Security Radar™" from BCC Risk Advisory, is a unique cloud-based managed service and trusted partner of several large organisations and SMEs in different industries and countries. It is a highly scalable SaaS (Software as a Service) which provides security assessments on Internet facing systems (websites, applications, servers, VoIP, mobile, and cloud) on a scheduled and on demand basis. edgescan™ features a hybrid approach of security automation coupled with manual verification by our engineers for real and accurate results. All findings and metrics can be accessed via the edgescan™ portal, where users can run reports on demand, integrate with other systems (via an open XML API) and pull many types on analytical data from the assessment data. For further information, follow us on Twitter: @edgescan ||https://www.edgescan.com
+
| {{MemberLinksv2|link=https://www.facebook.com/whitehat/report/|logo=Facebook-06-2015-Blue-on-White_(2).png}} ||Facebooks AppSec team is focused on discovering vulnerabilities and crafting creative solutions to eliminate them. We achieve this by doing code and design reviews, building tools, and automation, and manage our bug bounty program. Come to our booth to find out more and sign-up to win a FREE Oculus Go. ||https://www.facebook.com/whitehat/report/
 
|-
 
|-
| {{MemberLinksv2|link=https://www.elearnsecurity.com|logo=ELearnSecurity_owasp_150-45.png|size=150x45px}} || ||https://www.elearnsecurity.com
+
| |{{MemberLinksv2|link=https://www.fortinet.com/|logo=Fortinet-Logo-for-OWASP.png}} || ||https://www.fortinet.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.fico.com|logo=FICO-logo-108px.gif‎‎|size=150x45px}} ||FICO (NYSE:FICO) delivers superior predictive analytics solutions that drive smarter decisions. The company's groundbreaking use of mathematics to predict consumer behavior has transformed entire industries and revolutionized the way risk is managed and products are marketed. FICO's innovative solutions include the FICO® Score — the standard measure of consumer credit risk in the United States — along with industry-leading solutions for managing credit accounts, identifying and minimizing the impact of fraud, and customizing consumer offers with pinpoint accuracy. Most of the world's top banks, as well as leading insurers, retailers, pharmaceutical businesses and government agencies rely on FICO solutions to accelerate growth, control risk, boost profits and meet regulatory and competitive demands. FICO also helps millions of individuals manage their personal credit health through www.myFICO.com. Founded in 1956, FICO introduced analytic solutions such as credit scoring that have made credit more widely available, not just in the United States but around the world. We have pioneered the development and application of critical technologies behind decision management. These include predictive analytics, business rules management and optimization. We use these technologies to help businesses improve the precision, consistency and agility of their complex, high–volume decisions. ||http://www.fico.com
+
|{{MemberLinksv2|link=https://www.gemalto.com/|logo=Gemalto_Logo.jpg}} || ||https://www.gemalto.com/
 
|-
 
|-
|{{MemberLinksv2|link=http://fortinet.com|logo=Fortinet-Logo-for-OWASP.png‎|size=150x45px}} ||Fortinet (NASDAQ: FTNT) helps protect networks, users and data from continually evolving threats. As a global leader in high-performance network security, we enable businesses and governments to consolidate and integrate stand-alone technologies without suffering performance penalties. Unlike costly, inflexible and low-performance alternatives, Fortinet solutions empower customers to embrace new technologies and business opportunities while protecting essential systems and content. Learn more at www.fortinet.com. || http://fortinet.com
+
| {{MemberLinksv2|link=https://gosecure.net/|logo=Logo_Gosecure_(1).png}} || || https: / gosecure.  
 
|-
 
|-
| {{MemberLinks|link=http://www.gdssecurity.com|logo=GDS_LOGO_SMALL.jpg‎|size=150x45px}} ||Gotham Digital Science (GDS) is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management. GDS clients number among the largest financial services institutions and software development companies in the world. GDS security specialists work with clients to assess risk and then design, build, and maintain secure applications, networks, and processes. With offices located in New York City and London, GDS seamlessly and efficiently assists clients with operations on both sides of the Atlantic. GDS is a member of CREST, the Council of Registered Ethical Security Testers, as well as a member of the UK Government CHECK scheme, allowing GDS to provide security assurance services to Her Majesty's Government and UK Critical National Infrastructure on systems processing protectively marked information. ||http://www.gdssecurity.com
+
|{{MemberLinksv2|link=https://www.here.com/en|logo=HERE_Logo_MFL_Horizontal_RGB.png|size=150x45px}} ||Mapping has always been about discovery. For centuries, two-dimensional maps guided us through the unknown to our destination. But we are no longer limited by the edges of our physical maps. In 1985, we began with the simple goal to digitize mapping and pioneer in-car navigation systems. Over the next three decades, as NAVTEQ and Nokia, we’ve built a legacy in mapping technology. Today, we're creating living three-dimensional maps that grow upwards, breathing with layers of information and insights. By partnering with world-leading automakers, we are powering 4 out of 5 in-car navigation systems in North America and Europe. But we’re not just on the road. We are capturing the world in three dimensions, readying for an autonomous future. And we’re looking beyond. From autonomous driving to the Internet of Things, we are building the future of location technology through strategic partnerships with industry leaders like Intel, NVIDIA, Mobileye, and Tencent.  With headquarters in Amsterdam and development sites that span Chicago to Berlin and across to Mumbai, we are a global team with a shared passion. From data scientists and software developers to product engineers and mapping specialists, we come together from many different backgrounds to build a better future for location technology. ||https://www.here.com/en
 
|-
 
|-
|{{MemberLinksv2|link=http://www.hpenterprisesecurity.com|logo=HP_Blue_RGB_150_SM.png|size=300px90px‎|size=150x45px}} ||About HP Enterprise Security Products Today’s organizations are facing the most aggressive threat environment in the history of information technology. Emerging computing trends have greatly increased productivity and business agility—but at the same time, have introduced a host of new risks. Actionable security intelligence is critical to protecting your organization from this rising tide of security threats. HP is a leading provider of security intelligence and compliance solutions for enterprises that want to mitigate risk and defend against today’s most advanced threats. Based on market-leading products from ArcSight, Atalla, Fortify and TippingPoint, HP Enterprise Security Products enables organizations to take a proactive approach to security, integrating information correlation, application analysis and network-level defense. HP Security Research strengthens this portfolio of solutions through innovative research, delivering actionable security intelligence while providing insight into the future of security and the most critical threats facing organizations today. More information about HP Enterprise Security is available at http://www.hpenterprisesecurity.com|| http://www.hpenterprisesecurity.com
+
|{{MemberLinksv2|link=https://www.hisolutions.com/|logo=HiSolutions-Logo_150x45.jpg}} ||We combine know-how in the areas of security consulting, IT governance, risk & compliance with conceptual strength, innovation and implementation expertise. In addition to protecting applications and networks, our core competencies also include organizational tasks such as setting up security, risk, and service management system. HiSolutions AG is one of the leading consulting specialists for IT management and information security in Germany. More than 200 experts advise in the areas of security consulting, IT governance, business continuity management, and digitalization. We actively participate in the development of national and international standards and are involved in various research projects and university teachings. ||https://www.hisolutions.com
 
|-
 
|-
|{{MemberLinksv2|link=https://www.isc2.org|logo=ISC2MainLogoGreen.jpg|size=150x45px}} ||(ISC)²® is the largest not-for-profit membership body of certified information and software security professionals worldwide, with over 100,000 members in more than 160 countries. Globally recognized as the Gold Standard, (ISC)² issues the Certified Information Systems Security Professional (CISSP®) and related concentrations, as well as the Certified Secure Software Lifecycle Professional (CSSLP®), the Certified Cyber Forensics Professional (CCFP<sup>SM</sup>), Certified Authorization Professional (CAP®), HealthCare Information Security and Privacy Practitioner (HCISPP<sup>SM</sup>), and Systems Security Certified Practitioner (SSCP®) credentials to qualifying candidates. (ISC)² offers education programs and services based on its CBK®. Visit https://www.isc2.org ||https://www.isc2.org
+
|{{MemberLinksv2|link=https://www.htbridge.com/|logo=High-Tech_Bridge.png}} ||High-Tech Bridge is a global provider of web and mobile Application Security Testing (AST) services. Our award-winning AST platform ImmuniWeb® combines the genius of Human Intelligence with the power of Artificial Intelligence and Machine Learning. ImmuniWeb® leverages Artificial Intelligence (AI) and Machine Learning (ML) for intelligent automation of application vulnerability scanning and acceleration of application penetration testing. High-Tech Bridge's security experts from our CREST-accredited SOC look for the most complicated application vulnerabilities and attack vectors in instant synchronization and correlation with automated vulnerability scanning. Invented by High-Tech Bridge, this type of hybrid security testing, enhanced with AI/ML, delivers the most comprehensive vulnerability detection rate, continuously reduces human intervention without impacting the quality of testing, and contractually guarantees zero false-positives to every customer. ||https://www.htbridge.com
 
|-
 
|-
|{{MemberLinksv2|link=http://www.imperva.com|logo=IMPV_logo_RGB_300_TRIM-3.jpg|size=150x45px}} ||Imperva, pioneering the third pillar of enterprise security, fills the gaps in endpoint and network security by directly protecting high-value applications and data assets in physical, virtual, and data centers. With an integrated security platform built specifically for modern threats, Imperva data center security provides the visibility and control needed to neutralize attack, theft, and fraud from inside and outside; to mitigate risk; and to streamline compliance. Over 3,100 customers in more than 90 countries rely on our SecureSphere® platform to safeguard their business. Imperva is headquartered in Redwood Shores, California.  Learn more: https://www.imperva.com/, our blog, on Twitter. ||http://www.imperva.com
+
|{{MemberLinksv2|link=https://www.imperva.com/|logo=Imperva_logo.png}} ||Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success, generating $264 million in 2016, with over 5,200 customers and more than 500 partners in 100+ countries worldwide.||https://www.imperva.com/
 
|-
 
|-
 
|{{MemberLinksv2|link=http://www.informationbuilders.com|logo=IBI_Logo.jpg|size=150x45px}} ||Founded in 1975, Information Builders continues to deliver state-of-the-art technology that is transforming business in all commercial industries, government, and education. We remain one the largest independent, privately held companies in the software industry. Headquartered above Madison Square Garden in New York, Information Builders operates in more than 60 global locations and has built an active customer base of tens of thousands of major installations at the world's leading organizations. Information Builders is not only a major software supplier to our customers, but also a major provider to the leading software vendors in the industry including HP, IBM, Oracle, SAP, Teradata, and many others. In addition to our commitment to superior software engineering, we are equally proud of our people. Some of the most talented and creative professionals in the industry work at Information Builders and are passionate about what they do. In fact, the professionalism and tenure of our employees is often cited as a major differentiator by our customers. Our reputation for customer service has garnered us the highest honors from “CRM” magazine, the SSPA, and the American Business Awards. Our products and services have received top recognition from independent analyst research firms including Gartner, Forrester, Ventana Research, BARC, Butler, Bloor, and The Data Warehouse Institute (TDWI). Most importantly, our customers have received the most information technology and business awards for their accomplishments. More than 50 of our customers have had their information systems inducted into the Smithsonian Institute for superior information technology achievement through the Computerworld Honors Program. http://www.informationbuilders.com/about_us ||http://www.informationbuilders.com
 
|{{MemberLinksv2|link=http://www.informationbuilders.com|logo=IBI_Logo.jpg|size=150x45px}} ||Founded in 1975, Information Builders continues to deliver state-of-the-art technology that is transforming business in all commercial industries, government, and education. We remain one the largest independent, privately held companies in the software industry. Headquartered above Madison Square Garden in New York, Information Builders operates in more than 60 global locations and has built an active customer base of tens of thousands of major installations at the world's leading organizations. Information Builders is not only a major software supplier to our customers, but also a major provider to the leading software vendors in the industry including HP, IBM, Oracle, SAP, Teradata, and many others. In addition to our commitment to superior software engineering, we are equally proud of our people. Some of the most talented and creative professionals in the industry work at Information Builders and are passionate about what they do. In fact, the professionalism and tenure of our employees is often cited as a major differentiator by our customers. Our reputation for customer service has garnered us the highest honors from “CRM” magazine, the SSPA, and the American Business Awards. Our products and services have received top recognition from independent analyst research firms including Gartner, Forrester, Ventana Research, BARC, Butler, Bloor, and The Data Warehouse Institute (TDWI). Most importantly, our customers have received the most information technology and business awards for their accomplishments. More than 50 of our customers have had their information systems inducted into the Smithsonian Institute for superior information technology achievement through the Computerworld Honors Program. http://www.informationbuilders.com/about_us ||http://www.informationbuilders.com
 
|-
 
|-
| {{MemberLinks|link=http://www.intelligentenvironments.com|logo=Intelligent_environment_logo.jpg|size=150x45px}} ||We are an international provider of innovative mobile and online solutions for financial service organisations. Our mission is to enable our clients always to stay close to their customers. We do this through Interact®, our single software platform, which enables secure financial applications, engagement, transaction and servicing across all digital channels. Today these are predominantly focused on mobile, PCs & tablets. However Interact® can and will support other form factors, as and when they proliferate (as seen by our work to develop digital banking for the Smartwatch). We provide a ready alternative to internally developed solutions, enabling our clients with a faster route to market, expertise in managing the complexity of multiple devices and operating systems, and a constantly evolving solution. We are immensely proud of our many achievements, in relation to our innovation, our industry wide recognition, our demonstrable product differentiation, the diversity of our client base, and the calibre of our partners. For many years we have been at the heart of a wide range of financial organisations including Generali Wealth Management, Home Retail Group (HRG), Ikano Retail Finance & Loyalty, Lloyds Banking Group and Think Money Group. For further information visit http://www.intelligentenvironments.com and be sure to follow us on Twitter @IntelEnviro ||http://www.intelligentenvironments.com
+
|{{MemberLinksv2|link=https://www.ipswitch.com/|logo=Ipswitch_logo.png}} ||Ipswitch is an IT management software developer for small and medium-sized businesses. The company was founded in 1991 and is headquartered in Burlington, Massachusetts and has operations in Atlanta (Alpharetta) and Augusta, Georgia, American Fork, Utah, Madison, Wisconsin and Galway, Ireland. Ipswitch sells its products directly, as well as through distributors, resellers, and OEMs in the United States, Canada, Latin America, Europe, and the Pacific Rim. ||https://www.ipswitch.com/
 +
|-
 +
|{{MemberLinksv2|link=www.iriusrisk.com|logo=Logo_irius_150_45.png}} ||IriusRisk makes DevSecOps a reality with its pioneering threat modeling and SDL risk management platform. IriusRisk is a powerful tool to ensure security is woven into the design phase and followed up into production. It operates as a central orchestration point for teams to threat model and manage risk with real-time updates throughout the SDL. Built for integration, simplicity, scale, and speed, IriusRisk is the glue to bind Security, Operations & Development together. IriusRisk is a trusted partner of some of the largest financial institutions in the world and we pride ourselves on being fast to adapt, agile, flexible, responsive and ahead of the curve. IriusRisk operates globally and stands ready to partner with you. Contact us for more information and to request a demo. || www.iriusrisk.com
 +
|-
 +
| {{MemberLinksv2|link=http://www.johnsoncontrols.com/content/us/en/products/building_efficiency/product-security.html|logo=Johnson_Controls.jpg}} ||Johnson Controls is a global diversified technology and industrial leader serving customers in more than 150 countries. Our 130,000 employees create quality products, services, and solutions to optimize energy and operational efficiencies of buildings; lead-acid automotive batteries and advanced batteries for hybrid and electric vehicles; and seating components and systems for automobiles. Our commitment to sustainability dates back to our roots in 1885, with the invention of the first electric room thermostat. Through our growth strategies and by increasing market share we are committed to delivering value to shareholders and making our customers successful. In 2015, Corporate Responsibility Magazine recognized Johnson Controls as the #14 company in its annual “100 Best Corporate Citizens” list.”||http://www.johnsoncontrols.com/content/us/en/products/building_efficiency/product-security.html
 +
|-
 +
| {{MemberLinksv2|link=https://jscrambler.com/en/|logo=Jscrambler-logo.jpg}} ||Jscrambler is the leader in JavaScript Application Integrity and the only to offer RASP capabilities to your JS applications.As JavaScript becomes the standard for building websites, hybrid mobile applications, or other application types, most of the code is still completely exposed. With Jscrambler you can make your application self-defensive and resilient to both tampering and reverse-engineering attempts. Jscrambler is trusted by hundreds of companies (including Fortune 500) around more than 130 countries and is supported by a team of JS experts. ||https://jscrambler.com/en/
 +
|-
 +
|{{MemberLinksv2|link=https://www.kennasecurity.com/|logo=Kenna_Security_Logo.png}} ||Kenna Security provides a Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna accomplishes this by automating the integration of customer’s vulnerability scan data with exploit intelligence data from multiple sources, including 0-day data. Kenna then analyzes the data against active Internet breaches to identify the most critical threats before hackers can attack. 
 +
||https://www.kennasecurity.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.monitorapp.com|logo=MONITORAPP_Logo.png‎‎|size=150x45px}} ||MONITORAPP Co., Ltd, founded in 2005, is specialized in application security solution.  We performs R&D for various application acceleration technology and application security technology based on high performance application proxy technology to ensure fast and safe application delivery. We emphasize to create the best solution for our customers. MONITORAPP’s APPLICATION INSIGHT solution works with wherever has core application business application of corporate like Web, Database and VoIP, Unified Communication. WEB INSIGHT WAF™ is a hardware-based equipment of a gateway-type and is installed as a proxy in the network.  It is a real Web firewall solution which can detect and block real-time the outside hacking attempts and the attacks exploiting the vulnerabilities of Web applications without lowering the performance of each Web server. WEB INSIGHT SWG™ is a solution that filters unwanted software, malware from user-initiated Web and regulatory policy compliance.  It protects from APT attacks and evolved a variety of business from web threat attacks and defends your internal company website inside the web-enabled environment.  It is certified that it is a safety appliance-based Secure Web Gateway.  It provides flexibility required to meet business needs. MONITORAPP is also providing a service type of application security to meet the requirement of clouding security service. ||http://www.monitorapp.com
+
| {{MemberLinksv2|link=https://www.kiuwan.com/|logo=Kiuwan_Logo_150x45.png}} ||Kiuwan provides an end-to-end Software Analytics platform that offers objective data to make informed decisions to secure, analyze and control the entire SDLC of any application portfolio. With Kiuwan Code Security, the scope in threat mitigation is unparalleled, with over 4000+ custom rules, ability to suppress defects and create tailored action plans while meeting the most stringent industry standard requirements. In constant evolution, it boasts broad language support and integration with Jira, Jenkins, and Github to name but a few of the possibilities brought about by the platform. ||https://www.kiuwan.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.mstarsemi.com|logo=Mstar_logo.jpg‎|size=150x45px}} ||MStar Semiconductor, Inc. (“MStar”) is a world-class leader in Application Specific ICs (“ASIC”) with a focus on consumer electronic products and communication applications. Since the inception in 2002, MStar has established a strong brand and leadership position in LCD controller, analog and digital TV, set-top box, and mobile communication applications by fully leveraging its core expertise of cutting-edge design capabilities, continuous innovation and premier customer-focused services. Headquartered in Taiwan, MStar has a comprehensive global footprint with well-established R&D and customer support centers to provide a full range of total solutions for various consumer electronic applications. MStar went public in 2010 and is listed on Taiwan Stock Exchange. For more information, please visit www.mstarsemi.com. ||http://www.mstarsemi.com
+
| {{MemberLinksv2|link=http://mediatrust.com/|logo=TMT_Horiz_ShieldLogo_RGBGradient-Tagline_-_Edited.png}} || ‎The Media Trust is on a mission: fixing the internet. To make the internet a healthier, more valuable place for businesses, governments and consumers, The Media Trust’s centralized platform provides real-time visibility and insight into non-compliant activity and threats operating in enterprise website and mobile app environments. With an emphasis on third-party code beyond libraries, the platform identifies all executing code (including code from first, third and nth parties), analyzes its behavior, assesses compliance with company policies, and resolves violating behavior. The ability to manage third-party digital risk helps defend against website breaches which can lead to regulatory fines, revenue loss, and reputational harm. ||http://mediatrust.com/
 
|-
 
|-
| {{MemberLinks|link=http://moki.com|logo=Moki_Logo_-_Resized.png‎|size=150x45px}} ||Moki helps enterprises thrive in the app era through solutions that secure, monitor and support mobile apps. These solutions are used by enterprises across a variety of industries to create a more secure mobile app infrastructure. Moki’s mission is simple: secure mobile apps through visibility, insights and runtime security. MOBILE SECURITY Moki is developing a new type of security solution that will allow enterprises to secure their mobile apps through visibility, insights and runtime protection. MOBILE OPERATIONS Moki’s stack of mobile-ops solutions allows companies to deploy and manage any purposed-device mobilization initiative. These tools enable enterprises to create custom experiences using purposed devices and remotely manage, control and support those devices and the apps that run on them. ||http://moki.com
+
|{{MemberLinksv2|link=https://about.mercari.com/en/|logo=Mercari_service_primary_horizontal_(1).png}} ||Mercari is a C2C marketplace app that makes it easy for people to safely sell and ship their things. Launched in 2013, it's now among the largest peer-to-peer selling platforms globally. From fashion to toys, shoes to electronics and beyond, Mercari's mission is to ‘create value in a global marketplace where anyone can buy and sell’. ||https://about.mercari.com/en/
 
|-
 
|-
| {{MemberLinks|link=http://www.netspi.com|logo=Netspi_logo.png‎|size=150x45px}} ||NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. ||http://www.netspi.com
+
| {{MemberLinksv2|link=http://www.netspi.com|logo=NETSPI_Logo_2017_PNG-01.png|size=150x45px}} ||NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. ||http://www.netspi.com
 
|-
 
|-
| {{MemberLinksv2|link=http://www.netsuite.com|logo=Netsuite_Logo_Resized.jpg|size=150x45px}} ||About NetSuite  NetSuite Inc. is the industry's leading provider of cloud-based financials / Enterprise Resource Planning (ERP) and omnichannel commerce software suites. In addition to financials/ERP software suites, NetSuite offers a broad suite of applications, including accounting, Customer Relationship Management (CRM), Professional Services Automation (PSA) and ecommerce that enables companies to manage most of their core business operations in its single integrated suite. NetSuite software allows businesses to automate operations, streamline processes and access real-time business information anytime, anywhere. For more information about NetSuite, please visit www.netsuite.com. ||http://www.netsuite.com
+
|{{MemberLinksv2|link=https://www.nowsecure.com/|logo=NowSecure150x45.png}} ||Only the NowSecure Platform delivers automated 360-degree coverage of mobile app security testing with the speed and depth modern enterprises require. The world’s most demanding organizations and advanced security teams trust NowSecure to identify the broadest array of security, privacy, and compliance gaps in custom, third-party, and business-critical mobile apps. ||https://www.nowsecure.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.nokia.com|logo=Nokia.jpg‎|size=150x45px}} || ||http://www.nokia.com
+
| {{MemberLinksv2|link=https://www.oneconsult.com/en/|logo=Oneconsult_2018_logo.png|size=150x45px}}||Oneconsult group is your renowned Swiss cyber security services partner since 2003 with offices in Switzerland and Germany and 1500+ completed [https://www.google.com/url?hl=en&q=https://www.oneconsult.com/en/references/&source=gmail&ust=1518265556865000&usg=AFQjCNGmU2gOkH7NZzNBJMr-Fa6VUzw5NQ security projects] worldwide. Get expert advice from an owner-managed and vendor-independent consultancy with 35+ highly [https://www.oneconsult.com/en/team/ qualified cyber security experts], including certified penetration testers (OPST, OPSA, OSCP, OSCE, GXPN), digital forensics specialists (GCFA, GCFE, GREM), ISO security auditors (ISO 27001 Lead Auditor, ISO 27005 Risk Manager) and dedicated IT security researchers to solve even your most demanding information security challenges. Together we address your external and internal threats such as malware infections, hacker attacks and APT as well as digital fraud and data leakage with core services like [https://www.google.com/url?hl=en&q=https://www.oneconsult.com/en/penetration-test-en/&source=gmail&ust=1518265556866000&usg=AFQjCNHi0GC7EXHERYWB4vQF3qRgnoPMbg penetration tests / ethical hacking, real-life APT tests] and [https://www.oneconsult.com/en/iso-27001-security-audit/ ISO 27001 security audits]. In case of emergency, One consults [https://www.oneconsult.com/en/incident-response-it-forensics/ incident response & IT forensics] team supports you with around-the-clock expert assistance (24 h x 365 days).||English: https://www.oneconsult.com/en/
 +
Deutsch: https://www.oneconsult.com/de/
 
|-
 
|-
| {{MemberLinks|link=http://www.oneconsult.com|logo=OneConsult.jpg‎‎‎|size=150x45px}} ||Oneconsult AG is a privately held Swiss security consulting company with offices in Switzerland and Germany. Oneconsult does not sell any products and is therefore absolutely vendor- and product-independent. We operate internationally and specialize in information, application and IT security and are your reliable and trustworthy partner for identifying, assessing, preventing and properly addressing information and IT security threats. Our high-quality consulting services focus on [https://www.oneconsult.com/de/penetration-test/ penetration tests,] [https://www.oneconsult.com/de/iso-27001-security-audit/ ISO 27001 security audits] and [https://www.oneconsult.com/de/it-forensik/ IT forensics]. Oneconsult has already carried out over 1.000 security projects and has become a trusted and renowned provider of IT security consulting services to hundreds of organizations in Europe and overseas, including many Fortune Global 500 corporations. This is why Oneconsult has one of the largest teams of salaried penetration testers in Switzerland. Oneconsult has well-trained and certified digital forensics experts and a well-equipped digital forensics lab as well as an experienced ISO 27001 Lead Auditor team.||https://www.oneconsult.com/en/ https://www.oneconsult.com
+
| {{MemberLinksv2|https://www.oracle.com/index.html|logo=Oracle_Logo_150_30.jpg}}||   ||https://www.oracle.com/index.html
 
|-
 
|-
| {{MemberLinks|link=http://www.oracle.com/us/support/assurance/index.html|logo=Oracle_logo.gif‎|size=150x45px}} ||Oracle is shifting the complexity from IT, moving it out of the enterprise by engineering hardware and software to work together—in the cloud and in the data center. By eliminating complexity and simplifying IT, Oracle enables its customers—400,000 of them in more than 145 countries around the world—to accelerate innovation and create added value for their customersBy engineering out the complexity that stifles business innovation, Oracle is engineering in speed, reliability, security, and manageability. The result is best-in-class products throughout an integrated stack of hardware and software, with every layer designed and engineered to work together according to open industry standards. Oracle's complete, open, and integrated solutions offer extreme performance at the lowest cost—all from a single vendor. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible.||http://www.oracle.com/us/support/assurance/index.html
+
|{{MemberLinksv2|link= https://www.oxfordwebapps.co.uk/|logo=Oxfordwebapps-owasp-logo.png}} ||Since 1995 we have always developed the most up-to-date and progressive digital solutions designed to empower people. Our mission is to deploy the latest proven technology to deliver unique products with astounding performance. Our Oxford based team are responsible for delivering our full range of services which includes the design, development, hosting, supporting and testing of interactive Web Applications and websites.||https://www.oxfordwebapps.co.uk/
 +
|-
 +
|{{MemberLinksv2|link=https://www.panasonic.com/|logo=Panasonic_Logo.jpg}} ||100 years ago, Panasonic started with a desire to create things with value. Since then, the challenge has continued into various fields including home appliances to realize "A Better Life, A Better World".
 +
Considering product security as part of quality management, we have strived to improve the security of products. Specific activities include threat analysis during the design process, and vulnerability testing before shipment. After shipment, Panasonic PSIRT: Product Security Incident Response Team works to respond to incidents toward a quick resolution.
 +
To provide products that our customers can use with peace of mind, we will continue product security initiatives.
 +
||https://www.panasonic.com/
 +
|-
 +
|{{MemberLinksv2|link=http://tech.pingan.com/en/|logo=PingAn_Logo.png}} ||Ping An Technology (PATech), a wholly-owned subsidiary of Ping An Group, is committed to using AI, intelligent cognition, blockchain, cloud and other cutting-edge technologies to create a new cloud-based human life. PATech is the high-tech core and tech business incubator among Ping An Group, and be responsible for the development and operation of the critical platforms and services for the GroupAs an independent entity, with smart technology as a means and smart manufacturing as a blueprint, PATech focuses on the finance, healthcare and smart city areas, applies the technological capabilities certified by international authoritative certifications to actual business scenarios. || http://tech.pingan.com/en/
 +
|-
 +
| {{MemberLinksv2|link=http://www.rakuten.com|logo=Rakuten-Global-150x45_72dpi.JPG}} ||Rakuten, Inc. and its consolidated subsidiaries and affiliates ("Rakuten Group") are full-line Internet services companies. Since its founding in 1997, Rakuten, Inc. ("Rakuten") has spent a decade evolving its business model centered on e-commerce, to create a market completely new to Japan. The Rakuten Group is focusing on two approaches, in particular, to target growth in the decade to come. The first is to empower people and society through continuous innovation and business operations based on our five concepts of success. The second is to establish a "Rakuten eco-system" which enables us to maximize our customers lifetime value and leverage synergies. Guided by the key phrase "more than Web", the Rakuten Group is taking on the challenge of creating new value by driving convergence between the Internet and traditional "bricks and mortar" businesses. ||http://www.rakuten.com
 +
|-
 +
| {{MemberLinksv2|link=https://salt.security/ |logo=Salt_Logo@4x_-_Edited.png}} || Salt Security makes it safe to innovate by protecting the APIs at the core of every SaaS, web, mobile, microservices and IoT application. Our API Protection Platform is deployed in minutes, and requires no configuration or customization. We use patented behavioral protection to automatically and continuously discover and learn the granular behavior of each unique API to ensure protection. The company was founded in 2016 by alumni of the Israeli Defense Forces (IDF) and serial cybersecurity executives. In 2019 Salt Security was selected as a finalist for the RSA Innovation Sandbox and as the winner of the OWASP Innovation Fair. ||https://salt.security/
 
|-
 
|-
|{{MemberLinksv2|link=https://www.prevoty.com|logo=Prevoty_Logo.png|size=150x45px}} || ||https://www.prevoty.com
+
| {{MemberLinksv2|link=http://www.scsk.jp/index_en.html|logo=SCSK_Logo.jpg}} || SCSK provides a full lineup of services to support any area of IT solution required for businesses from system integration to IT infrastructure implementation, IT management, BPO(business process outsourcing), and IT hardware and software sales.In addition, we take advantage of the capability to support a global IT system network for customers including Sumitomo Corporation, aiming for further leaps ahead as a global IT services company. ||http://www.scsk.jp/index_en.html
 
|-
 
|-
| {{MemberLinks|link=http://www.protiviti.com|logo=Protiviti.jpg‎|size=150x45px}} ||Protiviti is a global business consulting and risk consulting firm composed of experts specializing in risk, advisory and transaction services. The firm helps solve problems in finance and transactions, operations, technology, information security & privacy, litigation, governance, risk, and compliance. Protiviti's highly trained, results-oriented professionals provide a unique perspective on a wide range of critical business issues for clients in the Americas, Asia-Pacific, Europe and the Middle East. Protiviti has more than 70 locations worldwide and is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. For additional information about Protiviti, Contact Rocco Grillo at [email protected] / 212.603.8381 ||http://www.protiviti.com
+
|{{MemberLinksv2|link=https://www.securebrain.co.jp/eng/|logo=SBC_Hitachi_Group1_-_Edited.png}} ||SecureBrain (A Hitachi Group Company) is a leader in providing software and services to help protect enterprises and their customers against cybercrime including online fraud and malware attacks.
 +
To ensure that our customers are always protected from the latest trend of cybercrime, SecureBrain has its own advanced security research center. Team of security researchers works closely with many Japanese government research agencies to research and develop solutions against the latest cyber threats.  
 +
||https://www.securebrain.co.jp/eng/
 
|-
 
|-
| {{MemberLinks|link=http://www.pwc.be/en/technology-consulting/index.jhtml |logo=PWC_log_resized.png‎|size=150x45px}} ||As part of the PwC Advisory services, the department Technology Consulting, from which we will mainly invoke experts, is to be found. This department contains professionals who are specialised in management or business advice related to the introduction and use of information technology. The services of Technology Consulting are set up in order to assist our clients in each of the critical and supporting phases during the implementation path.  Our service offerings are structured into 3 different domains, manage, transform and secure. Manage Technology: Following questions are handled in '''Manage Technology:''' outsourcing, business continuity, Service Level Agreements (SLAs), Service Management strategy, design & implementation, whether or not the IT architecture is future-proof, (re)design of enterprise wide systems, how to orientate IT as a service organization, etc. '''Transform through Technology:''' Most of the projects in Transform through Technology consist of preparing / drafting business cases, support / guidance in project planning & project management, managing external IT services, change management in large IT projects, improving data quality, organizing data migration, support in request for proposals and tenders, user security and authorization set up, documentation creation, etc. This expertise focuses on helping companies during technology transformation projects where technology has an important (controlling) role. '''Secure Technology:''' All kinds of assignments related to the privacy legislation, ISO2700x certification, security against hackers, security architecture, secure software, etc. We have substantial experience in securing major financial and other systems, i.e. electronic voting, electronic payment, Digitach, e-ID, mobile, etc.  ||http://www.pwc.be/en/technology-consulting/index.jhtml
+
|{{MemberLinksv2|link=https://www.securityjourney.com/|logo=Security_journeylogo_(1).png}}||Security Journey is the leader in application security education using security belt programs. We guide our clients – many in tech, healthcare, and finance – to building long-term, sustainable application security culture. We incorporate everything you need to deploy and manage an education program.
 +
Our cloud-based platform delivers application security lessons from an ever-growing library of content, provides hands-on, immersive experiments, measures student and organizational growth, rewards student achievements, and transforms an enterprise’s security culture.
 +
We promote security awareness organization-wide with learning that is engaging, motivating, and fun. In short, we provide security education developers, testers, and managers love.   
 +
||https://www.securityjourney.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.qualys.com|logo=Qualys_Logo.gif‎|size=150x45px}} || Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. The QualysGuard Cloud Platform and integrated suite of applications helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). ||http://www.qualys.com
+
|{{MemberLinksv2|link=https://securecodewarrior.com/|logo=Scw_white_v_(3).png}} ||Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning. We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and the Asia Pacific. To learn more, visit https://securecodewarrior.com<nowiki/>.||https://securecodewarrior.com/
 
|-
 
|-
| {{MemberLinksv2|link=http://www.rackspace.com|logo=Rackspace.jpg|size=150x45px}} || ||http://www.rackspace.com
+
| |{{MemberLinksv2|link=http://www.securitycompass.com/|logo=Securitycompass-stacked_(1).jpg}} ||Security Compass is a leader in helping customers proactively manage cybersecurity risk without slowing down their business.  Offering Advisory Services, Training, and SD Elements, an award-winning policy to procedure platform for security and compliance.  Security Compass enables organizations to rapidly and efficiently deliver technology that's secure by design.  Security Compass serves some of the world's largest businesses including seven of the 15 largest financial institutions and four of the 10 largest technology companies in North America.
 +
||http://www.securitycompass.com
 
|-
 
|-
| {{MemberLinks|link=http://www.rakuten.com|logo=Rakuten-Global-150x45_72dpi.JPG}} ||Rakuten, Inc. and its consolidated subsidiaries and affiliates ("Rakuten Group") are full-line Internet services companies. Since its founding in 1997, Rakuten, Inc. ("Rakuten") has spent a decade evolving its business model centered on e-commerce, to create a market completely new to Japan. The Rakuten Group is focusing on two approaches in particular to target growth in the decade to come. The first is to empower people and society through continuous innovation and business operation based on our five concepts of success. The second is to establish a "Rakuten eco-system" which enables us to maximize our customers lifetime value and leverage synergies. Guided by the key phrase "more than Web", the Rakuten Group is taking on the challenge of creating new value by driving convergence between the Internet and traditional "bricks and mortar" businesses. ||http://www.rakuten.com ||  
+
| {{MemberLinksv2|link=https://securityinnovation.com|logo=Security_Innovation.png}} || Security Innovation is a pioneer in software security and trusted advisor to its clients. Since 2002, organizations have relied on our assessment and training solutions to make the use of software systems safer in the most challenging environments – whether in Web applications, IoT devices, or the cloud. The company’s flagship product, [https://www.securityinnovation.com/training/cmd-ctrl-cyber-range-security-training/ CMD+CTRL Cyber Range], is the industry’s only simulated Web site environment designed to build the skills teams need to protect the enterprise where it is most vulnerable – at the application layer. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit [https://www.securityinnovation.com/ www.securityinnovation.com] or connect with us on [https://www.linkedin.com/company/security-innovation/ LinkedIn] or [https://twitter.com/secinnovation Twitter].
 +
||https://securityinnovation.com
 
|-
 
|-
||{{MemberLinksv2|link=http://www.ranorex.com|logo=Ranorex_Logo.pdf|size=150x45px}} || Ranorex is a software development company that provides innovative software testing solutions to thousands of companies and education institutions around the world. Ranorex offers a comprehensive range of test automation tools for developing and managing the testing of any desktop, web or mobile application. Ranorex is dedicated to fundamentally improving the quality of software. The Ranorex test automation tools allow both testers and developers to thoroughly test applications from a user´s perspective, making bugs easier to identify and eliminate. Ranorex is cost effective – it’s based on standard programming techniques and common languages such as C# and VB.NET. The tools allow test automation for a variety of environments, devices and applications. Currently supported technologies include .NET, Winforms, WPF, Java, SAP, HTML5, Flash, Flex, Silverlight, iOS, Android, Windows Mobile (native/hybrid) and many more. Out of the box robust test automation based on Ranorex´s market leading GUI object recognition, script-free testing for non-programmers, seamless integration into existing environments and click & go test reports are a few of Ranorex´s features. Due to its ease of use, increased testing accuracy and low cost per seat, Ranorex is an excellent choice for software development teams of virtually any size or level of sophistication. ||http://www.ranorex.com
+
| {{MemberLinksv2|link=https://blog.shiftleft.io/|logo=ShiftLeft.png}} ||ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle. It combines next-generation static code analysis (to quickly and accurately identify vulnerabilities) with application instrumentation (to protect the application) in an automated workflow. This combination of runtime-informed code analysis and code- informed runtime protection delivers the most accurate, automated, and comprehensive application security solution. || https://blog.shiftleft.io/
 
|-
 
|-
| {{MemberLinks|link=http://www.riverbed.com|logo=Riverbed_Logo.png‎|size=150x45px‎}} ||Riverbed Technology delivers application performance for the globally connected enterprise. With Riverbed, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery without fear of compromising performance. By giving enterprises the platform they need to understand, optimize and consolidate their IT, Riverbed helps enterprises to build a fast, fluid and dynamic IT architecture that aligns with the business needs of the organization. Additional information about Riverbed (RVBD) is available at www.riverbed.com. || http://www.riverbed.com
+
| {{MemberLinksv2|link=http://www.sonatype.com|logo=Son_logo_main_vertical2x_-_Edited.png}} ||There are a staggering volume and variety of open source and third-party component parts flowing through every development environment in the world. If properly sourced and managed, these components are a tremendous source of energy for accelerating innovation. If not, they lead directly to security vulnerabilities, licensing risks, enormous rework, and waste. With over 120,000 installations and counting, Sonatype’s Nexus products are helping modern development organizations intelligently source, manage, assemble, and maintain open-source and third-party components, so they can improve the quality, security, and speed of their software supply chains.|| http://www.sonatype.com
 
|-
 
|-
| {{MemberLinksv2|link=http://www.salesforce.com|logo=Salesforce_logo_resized.png‎|size=150x45px}} || ||http://www.salesforce.com
+
| {{MemberLinksv2|link=https://www.stackhawk.com/|logo=Stackhawk_long1x.jpg}} ||StackHawk is dynamic application vulnerability scanning built for modern development teams. With simple configuration, easy invocation via docker command, and interpretable results, StackHawk is built for developers to take control of their AppSec. Learn more at docs.stackhawk.com. ||https://www.stackhawk.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.scs.co.jp/sys/|logo=Sys_scsk_logo_banner_3.jpg‎|size=150x45px}} ||Japan-based global IT service company, SCSK supplies the whole range of IT solutions, system integration to IT infrastructure implementation, IT management, BPO, IT hardware and software sales.Particularly in security field, SCSK offers full-line Web security solution which is prompt and accurate provision against up-to-date cyber attack with a service brand, “SECURE YOUR SITE ™”. On a mission to contribute to enterprises’ business, SCSK assures the safety of IT system with security-oriented consulting, system design, application development, security system implementation, operation and monitoring. SCSK SOC and CSIRT team strongly support enterprises’ stability on a 24/7 basis. ||http://www.scs.co.jp/sys/
+
| {{MemberLinksv2|link=https://snyk.io|logo=Copy_of_Snyk_Logo.png}}||Snyk is a developer-first security solution that helps you use open source code and stay secure. Building on its unique vulnerability database, Snyk continuously finds and fixes known vulnerabilities & license violations in open source dependencies and containers. Snyk integrates seamlessly into the developers’ workflow and enables them to own the open source security of their code thus supporting security at scale.||https://snyk.io/
 
|-
 
|-
| {{MemberLinksv2|link=https://www.sig.eu/en/|logo=Unnamed.jpg |size=150x45px}} ||'''Getting Software Right''' SIG works towards improving software quality; Worldwide! SIG is an international scientific institute that has its own accredited (ISO/IEC 17025) lab; covers about 100 technologies and has a strong research focus. SIG has designed the SIG 5-star classification system for software quality, based on the ISO/IEC 25010 model. This model allows us to measure quality; benchmarks systems and estimate costs of changes. We show you (based on facts) what is the most cost-efficient and least risky roadmap for evolution and usage of the software systems and thus allow you to respond rapidly to changes in the market and your customers. This television item provides a nice overview of SIG's vision on software security: [https://lnkd.in/dSi4-k7 https://lnkd.in/dSi4-k7] ||https://www.sig.eu/en/
+
|{{MemberLinksv2|link=https://developer.springcm.com/|logo=SpringCM_Logo.png}} ||SpringCM delivers an innovative document workflow and management platform, powering the leading contract management application. SpringCM empowers companies to become more productive by reducing the time spent managing mission-critical business documents. Intelligent, automated workflows enable document collaboration across an organization from any desktop or mobile device. Delivered through a secure cloud platform, SpringCM’s document and contract management solutions work seamlessly with Salesforce or as a standalone solution. Every day, more than 600 companies use SpringCM to improve customer experience and get more done, faster. For more information about SpringCM, visit [http://www.springcm.com www.springcm.com]. ||https://developer.springcm.com/
 
|-
 
|-
|{{MemberLinksv2|link=http://www.smartrac-group.com |logo=SMT_Logo_150x45.jpg|size=150x45px}} ||SMARTRAC is the leading developer, manufacturer and supplier of RFID and NFC transponders, tags and inlays. The company produces both ready-made and customized solutions used in access control, animal identification, automated fare collection, border control, RFID-based car immobilizers, contactless payment cards, electronic product identification, industry, libraries and media management, laundry, logistics, mobile and smart media, public transport, retail, and many more. SMARTRAC has its registered headquarters in Amsterdam, The Netherlands. The company maintains a global research and development, production and sales network. For more information, visit www.smartrac-group.com and follow us on Twitter: www.twitter.com/SMARTRAC_NV || http://www.smartrac-group.com
+
| {{MemberLinksv2|link=https://www.symantec.com/https://www.symantec.com/|logo=NI-SYM_Horiz_web150x40.jpg}} ||Symantec Corporation (NASDAQ: SYMC), the world’s leading cybersecurity company, helps organizations, governments, and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud, and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For more information, please visit www.symantec.com. ||https://www.symantec.com
 
|-
 
|-
| {{MemberLinksv2|link=http://www.solutions-ii.com|logo=SolutionsIILogo.jpg|size=150x45px}} || ||http://www.solutions-ii.com
+
| {{MemberLinksv2|link=https://www.synopsys.com/|logo=Synopsys_Logo.jpg}} || Synopsys technology is at the heart of innovations that are changing the way we live and work. The Internet of Things. Autonomous cars. Wearables. Smart medical devices. Secure financial services. Machine learning and computer vision. These breakthroughs are ushering in the era of Smart, Secure Everything―where devices are getting smarter, everything’s connected, and everything must be secure. Powering this new era of technology are advanced silicon chips, which are made even smarter by the remarkable software that drives them. Synopsys is at the forefront of Smart, Secure Everything with the world’s most advanced tools for silicon chip design, verification, IP integration, and application security testing. Our technology helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything. ||https://www.synopsys.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.sonatype.com|logo=Sonatype_Logo_Resized.png‎|size=150x45px}} ||Sonatype secures modern software development by fixing at-risk applications, automating policy throughout the lifecycle and identifying hidden risks in your applications. Sonatype's Component Lifecycle Management identifies and tracks OSS components, automates and enforces policy, and prevents the use of flawed components throughout the software lifecycle. Ask about free risk assessments.|| http://www.sonatype.com
+
|{{MemberLinksv2|link=https://www.tcell.io/|logo=TCell.io_logo.png}} ||tCell moves application security out of the network for cloud-first organizations. Using advanced runtime application self-protection technology, tCell protects applications in-production from XSS, Commandi, SQLi, Account Takeover, and OWASP Top 10 attacks. Whether an organizations’ applications are on-premises or cloud-based, tCell's unique approach makes application security easy.
 +
||https://www.tcell.io/
 
|-
 
|-
| {{MemberLinksv2|link=https://continuousassurance.org|logo=SWAMP_Logo.png|size=150x45px}} || ||https://continuousassurance.org
+
|{{MemberLinksv2|link=http://www.thoughtworks.com|logo=ThoughtWorks Logo.png|size=150x45px}} ||We are a software company and community of passionate, purpose-led individuals. We think disruptively to deliver technology that addresses our clients’ toughest challenges, all while seeking to revolutionize the IT industry and create positive social change. ThoughtWorks' 3,000 professionals serve clients from offices in Australia, Brazil, Canada, China, Ecuador, Germany, India, Italy, Singapore, South Africa, Turkey, Uganda, the United Kingdom, and the United States.  ThoughtWorks releases a regular technology radar, a study that looks at the key trends that impact software development and business strategies. The Radar helps companies stay on top of topics that are constantly evolving, such as security, and offers insight and practical tools to build secure systems at every stage of the development process. ||http://www.thoughtworks.com/
 
|-
 
|-
| {{MemberLinksv2|link=http://www.symantec.com|logo=SymantecLogo150x40.jpg|size=150x45px}} ||Symantec Corporation (SYMC) is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings -- anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks, has provided leading security, backup and availability solutions for where vital information is stored, accessed and shared. The company's more than 20,000 employees reside in more than 50 countries. Ninety-nine percent of Fortune 500 companies are Symantec customers. To learn more go to [http://www.symantec.com www.symantec.com] or connect with Symantec at: [http://www.symantec.com/social/ www.symantec.com/social/]. || [http://www.symantec.com http://www.symantec.com]
+
| {{MemberLinksv2|link=https://www.twistlock.com/|logo=Twistlock_2017_Logo-Lockup_TM_RGB_copy.jpg}} ||Twistlock is the most complete, automated and scalable cloud native cybersecurity platform. Trusted by hundreds of customers worldwide, Twistlock uses the strengths of cloud native to provide better security for teams using Docker, Kubernetes, Lambda, Fargate, and other modern technologies. ||https://www.twistlock.com/
 
|-
 
|-
| {{MemberLinksv2|link=https://www.synack.com|logo=Synack-logo-150x45.png|size=150x45px}} ||Synack is the first to truly unleash the potential of enterprise-grade vulnerability assessments utilizing Crowd Security IntelligenceTM. The Synack platform provides the only secure, continuous, scalable and human-powered security assessment on the market. Its subscription Security-as-a-Service solution redefines the static, signature-centric model of security testing and vulnerability discovery. Customers safely engage a global community of highly-skilled and trusted security researchers, enabling continuous testing of Web applications, mobile applications, host infrastructure and beyond. Synack was founded in 2013 by ex-NSA security experts Jay Kaplan, CEO, and Dr. Mark Kuhr, CTO. For more information, visit http://www.synack.com || http://www.synack.com 
+
|{{MemberLinksv2|link=https://vex.ubsecure.jp/lpen||logo=Ubsecure-logo.png}} ||UBsecure is a leading web application security company based in Japan since 2007. We offer various security solutions for web application and smartphone application by utilizing in-house developed application security testing tool, Vex. Vex built by a tremendous amount of experience in professional security scanning and by its continuous feedback. The unique characteristic of the tool is that it used as a stand-alone security testing tool as well as the seamless security testing component within the SDLC. Therefore, Vex is not only for professional security auditors but also for software developers who need secure development cycles. Please visit our site for more information about Vex.||https://vex.ubsecure.jp/lpen
 
|-
 
|-
|{{MemberLinksv2|link=http://www.thesecurityfactory.be|logo=The_Security_Factor_logo.jpg‎|size=150x45px}} ||“Delivering solutions to measure and improve the state of security in your organisation” We provide information security services and solutions for your organisation and multiple layers of security to your infrastructure, applications and facilities. Security threats and attacks are rapidly increasing and becoming more advanced every day; what used to be more than sufficiently secure is no longer adequate today. To be able to keep up with current and future threats, advanced countermeasures need to be put in place. Recent versions of security hard- and software as well as Microsoft operating systems already contain a wealth of security functionalities, which unfortunately are rarely understood and used to their fullest potential. Our mission is to educate, train and guide you to increase the security level of your organisation by effectively using what you have already purchased. We will use our expertise to assist you in the decision making process when acquiring necessary security products and services that will compliment your on-going security investments. ||http://www.thesecurityfactory.be
+
|{{MemberLinksv2|link=https://www.ups.com/us/en/Home.page|logo=UPS.jpg}} || ||https://www.ups.com/us/en/Home.page
 
|-
 
|-
|{{MemberLinksv2|link=http://www.trendmicro.com/us/index.html|logo=Trendmicro.gif|size=150x45px}} || ||http://www.trendmicro.com/us/index.htm
+
|{{MemberLinksv2|link=https://www.veracode.com/|logo=VeraCode_logo.png}} || Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world.
 +
||https://www.veracode.com/
 
|-
 
|-
| {{MemberLinks|link=https://www.trustwave.com/application-security.php|logo=Trustwave_logo_RGB_-Resized_(1).jpg‎|size=150x45px}} ||With insight into the latest vulnerabilities, attack vectors, exploits, malware and security breaches gathered from our security research, penetration testing and incident response engagements - Trustwave's elite security team, SpiderLabs, understands how attackers think and operate. We apply our deep, specialized knowledge to every customer engagement and implant that intelligence in every one of our security products and services. || [http://www.trustwave.com www.trustwave.com]
+
|{{MemberLinksv2|link=https://www.verizondigitalmedia.com/platform/edgecast-cdn/security/|logo=Verizon_Digital_Medial_Logo.jpg}} ||Verizon Digital Media Services offers a global, PCI-compliant content delivery network to protect websites, applications and user data at every layer. Integrated with our industry-leading platform, our Cloud Security Solution offers world-class protection, performance and scale to keep your business online. Our network features:
 +
*An advanced Web Application Firewall (WAF) to protect web applications against attacks
 +
*Robust DDoS protection with massive capacity to thwart the largest attacks
 +
*Bot mitigation to defend against automated threats and bad bots
 +
*Added protection for web servers to defend against direct-to-origin attacks
 +
*Built-in DNS protection with DNSSEC to prevent injection of fraudulent records
 +
*A security operations team ready to provide a fully managed security offering<br>
 +
Contact us today to learn more about our Cloud Security Solution or visit us at [http://www.verizondigitalmedia.com www.verizondigitalmedia.com].
 +
||https://www.verizondigitalmedia.com/platform/edgecast-cdn/security/
 
|-
 
|-
| {{MemberLinks|link=https://www.twitter.com|logo=Twitter-bird-blue-on-white_sized.png‎|size=150x45px}} ||With 400 million Tweets per day and more than 200 million active users, there is something for everyone on Twitter, no matter what you're interested in or where you are in the world. Twitter can be accessed on the web, on smartphones and on the simplest of feature phones. At Twitter, we believe that the open exchange of information can have a positive global impact and are inspired by stories of people using Twitter to improve the world in unexpected ways. Twitter is one of the top 5 most visited sites in the world, and we're tackling unique challenges at scale while keeping our users safe.|| https://www.twitter.com
+
|{{MemberLinksv2|link=http://www.waratek.com/|logo=Warateklogo.jpg}} ||The Waratek ARMR Platform provides unique protection in the applications runtime environment. This unique security layer provides fast and accurate security in the compilation pipeline, providing protection that becomes part of your application – but never requires changes to source code.
 +
● Instantly apply code equivalent security patches to Java and .NET applications
 +
● Actively secure against the OWASP Top Ten / SANS 25 / Zero-Day vulnerabilities
 +
● Virtually upgrade & secure out-of-support, vulnerable Java applications.
 +
All with no source code changes or False Positives.
 +
||http://www.waratek.com/
 
|-
 
|-
| {{MemberLinks|link=http://www.uievolution.com|logo=UIE_Evolution_Logo.png‎|size=150x45px}} ||UIEvolution is the leading mobile solutions provider for Fortune 1000 companies. We help companies take full advantage of connected screens by extending their brands, delivering their unique business objectives, and ensuring that the devices that create the mobile lifestyles of their customers are joined in a continuous thread - smartphones, tablets, smart TVs, and automotive applications. UIEvolution combines world-class consultative services and deep industry knowledge with the proven UIEngine & Evolution Platform. Headquartered in Seattle with offices in Tokyo and Honolulu, UIEvolution has a 13-year track record with clients like Toyota, AT&T, Microsoft, Disney, Princess Cruises, Samsung, Clarion, Mitsubishi, and NTT. ||http://www.uievolution.com  
+
|{{MemberLinksv2|link=https://wallarm.com/|logo=Wallarm Logo (1).png|size=150x45px}} || Wallarm delivers automated cloud-native application and API security throughout application development and deployment lifecycle.  
 +
Wallarm AI-powered Application Security Platform includes FAST for CI/CD-integrated security test automation during development and Advanced WAF attack blocking and vulnerability protection after deployment.  
 +
Wallarm platform aligns security and development into a unified pipeline:
 +
# Detects OWASP Top 10, 0 day and behavioral issues     
 +
# Provides highly accurate detection based on patent-pending technology     
 +
# Improves security test coverage by automatically generating and running tests     
 +
# Automates issue management with deep learning, policies and build in active rechecker     
 +
# Provide easy-to-manage multi-tenant multi-application unified management platform
 +
|| https://wallarm.com/
 
|-
 
|-
| {{MemberLinks|link=https://www.ups.com/|logo=UPS.jpg‎|size=150x45px}} ||UPS (NYSE: UPS) is a global leader in logistics, offering a broad range of solutions including the transportation of packages and freight; the facilitation of international trade, and the deployment of advanced technology to more efficiently manage the world of business. Headquartered in Atlanta, UPS serves more than 220 countries and territories worldwide. The company can be found on the Web at UPS.com and its corporate blog can be found at blog.ups.com. To get UPS news direct, visit pressroom.ups.com/RSS. Technology: UPS employs nearly 4,300 information technology professionals and supports UPS.com which averages around 27 million page views with 39.5 million packages tracked daily. More UPS technology facts may be found on www.ups.com under About UPS, UPS Facts and UPS Jobs. ||https://www.ups.com
+
| {{MemberLinksv2|link=https://www.whitehatsec.com/|logo=WhiteHat_2016_Primary_Logo.png}} ||WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. Through a combination of technology, over a decade of intelligence metrics, and the judgment of people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry.||https://www.whitehatsec.com
 
|-
 
|-
| {{MemberLinks|link=https://www.veracode.com|logo=VeraCode_Resized.png‎|size=150x45px}} ||Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog. ||https://www.veracode.com
+
|{{MemberLinksv2|link=https://www.whitesourcesoftware.com/|logo=Whitesource_logo.png}} ||WhiteSource helps software security teams manage open source components used in their products, automatically and continuously. It becomes part of your SDLC and automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components.
 +
||https://www.whitesourcesoftware.com
 
|-
 
|-
 
|}
 
|}

Latest revision as of 14:16, 21 November 2019

Disclaimer: Corporate Supporter Bios are not endorsements and reflect the message of the supporter only.

Elite Corporate Members

{{{size}}}       Allstate Corporation is the largest publicly held personal lines property and casualty insurer in America, serving more than 16 million households nationwide. Founded in 1931, Allstate has been dedicated to protecting our customers from life’s uncertainties and preparing them for the future for more than 85 years. As the needs of our customers evolve, so does our technology and security practices to ensure our customers remain in good hands. https://www.allstate.com/
{{{size}}}       Our purpose is to build trust in society and solve important problems. In today's digital world that requires a focus on cybersecurity in order to build a secure digital society. We help clients across society to understand their cybersecurity risk; build and assure their defenses; identify and respond to attacks, and to navigate the complex legal and regulatory environment for cybersecurity. For more information please visit www.pwc.co.uk/cybersecurity http://www.pwc.co.uk/cybersecurity

Premier Corporate Members

Company Company Description Contact
300px90px       Adobe is the global leader in digital marketing and digital media solutions. Our tools and services allow our customers to create groundbreaking digital content, deploy it across media and devices, measure and optimize it over time, and achieve greater business success. We help our customers make, manage, measure, and monetize their content across every channel and screen. http://www.adobe.com/
{{{size}}}       HackerOne (www.hackerone.com) is the #1 hacker-powered security platform, helping organizations receive and resolve critical vulnerabilities before they can be exploited. More than 1,000 organizations, including the U.S. Department of Defense, U.S. General Service Administration, General Motors, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Square, Starbucks, Dropbox and the CERT Coordination Center trust HackerOne to find critical software vulnerabilities. HackerOne customers have resolved over 57,000 vulnerabilities and awarded over $22M in bug bounties. HackerOne is headquartered in San Francisco with offices in London and the Netherlands. https://www.hackerone.com/
{{{size}}}       Netsparker develops an industry leading automated web application security scanner. Available as Windows desktop software and as a Cloud service, the Netsparker scanner is very easy to use and its proof-based vulnerability scanning technology enables you to easily and automatically detect SQL Injection, Cross-site scripting and other vulnerabilities in your websites, web applications and web services. Netsparker’s unique scanning, detection and auto exploitation techniques allow it to be dead accurate. Therefore you do not have to waste time manually verifying the scanner’s findings and instead can focus on fixing the identified vulnerabilities. Netsparker is trusted and used by world renowned companies such as Samsung, Ernst & Young, Skype, NASA, ISACA and ING Bank. https://www.netsparker.com
{{{size}}}       Qualys is a pioneer and leading provider of cloud-based security and compliance solutions. The Qualys Cloud Platform and its integrated apps - including Web Application Scanning (WAS) - help businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence and automating the full spectrum of auditing, compliance, and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). https://www.qualys.com
300px90px       Salesforce is the world’s #1 customer relationship management (CRM) platform. Our cloud-based applications for sales, service, marketing, and more don’t require IT experts to set up or manage — simply log in and start connecting to customers in a whole new way. https://www.salesforce.com/
300px90px       Signal Sciences secures the most important web applications, APIs, and microservices of the world's leading companies. Our next-gen WAF and RASP help you increase security and maintain site reliability without sacrificing velocity, all at the lowest total cost of ownership. Learn how our patented approach can help you. http://www.signalsciences.com

Contributor Corporate Members

Company Company Description Contact
Acunetix logo 200.png       Acunetix’s team of experienced engineers developed a lead in website, web application, and Internet-facing server analysis and vulnerability detection. Available both on-premise and online, Acunetix uses deep crawling techniques to detect exploitable vulnerabilities such as SQL injection, and all forms of Cross-Site scripting – while providing concise vulnerability reports and information on how to fix them allowing you to protect your business against impending hacker attacks. Acunetix customers include Cisco, NASA, American Express, Sony, HSBC, The Pentagon, Skype, and many more. You can find us online at www.acunetix.com. http://www.acunetix.com
{{{size}}}       Altitude Networks tackles data security in the cloud to protect enterprises against unauthorized data access, accidental or malicious sharing to unintended individuals, and data theft. http://www.altitudenetworks.com/
{{{size}}}       Aon’s Cyber Solutions offers holistic cyber security, risk and insurance management, investigative skills, and proprietary technologies to help clients uncover and quantify cyber risks, protect critical assets, and recover from cyber incidents.

Cyber security services provided by Stroz Friedberg Limited and its affiliates. Cyber risk services provided by Aon UK Limited and its affiliates

https://aon.com/cyber-solutions
{{{size}}}       Arxan, the global trusted leader of application protection solutions, delivers the confidence to build, deploy, and manage an organization’s most innovative and valuable applications. Currently protecting more than 1 billion application instances across industries including financial services, mobile payments, healthcare, automotive, gaming, and entertainment, the company provides the industry’s most comprehensive application protection solution. Unlike legacy security providers that rely on perimeter-based barriers to keep bad actors out, Arxan protects applications at the source and binary code level to expand the area of trust and provides a broad range of enterprise services and patented security capabilities such as code hardening, obfuscation, encryption, and Whitebox cryptography. Founded in 2001, the company is headquartered in North America with global offices in EMEA and APAC. https://www.arxan.com/
{{{size}}}       Avatao is an online training platform for building secure software. It offers a rich library of hands-on IT security exercises for software engineers to teach secure programming from design to deployment in a fun and intuitive way. Educating for secure software can significantly improve software quality, increase trust in a company’s brand, reduce development costs and reduce the risks of suffering significant losses from cyber-attacks. In today’s world, secure software development practices are a basic requirement and we believe the solution should be integrated into the ground roots of software development teams. The platform can be used to provide security awareness to software engineers, to enrich existing IT security training, meetups or allow self-directed learning for continuous professional development. Avatao hackathons are also an excellent method to discover talented developers and engage and build brand awareness in the community. Avatao is a creation out of CrySyS Lab, world-renowned experts in IT security. Learning communities like business teams use Avatao for an improved and efficient learning experience. Mid-size and large software and financial companies use Avatao’s gamified online training to organize security hackathons, onboard new hires or upskill software developers to build secure software. The Avatao platform was publicly launched in 2016 for end-users and business customers. Initial customers include LogMeIn (US), Prezi (HU), Microsec (HU), Emarsys (HU), Photobox (UK), and many other companies are piloting the platform including Fortune 100 companies. Avatao currently has 5000+ users and 500+ exercises. https://avatao.com/
{{{size}}}       Avi Networks completes enterprises’ digital transformation with its software load balancer, intelligent Web Application Firewall, and modern application services. The Avi Vantage Platform is deployed across data centers and clouds, delivering better elasticity, intelligence, and cost savings by providing granular per-tenant and per-app services. Customers enjoy 5X faster application rollouts, actionable analytics, and 70% lower costs. https://www.avinetworks.com
{{{size}}}       Brinqa is a leading provider of unified risk management – enabling stakeholders, governance organizations, and infrastructure and security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organization’s existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. With Brinqa, organizations are reducing response time to emerging threats, impact to the business, and technology risk and compliance costs by over 50% through real-time risk analytics, automated risk assessments, prioritized remediation, actionable insights, and improved communication. Founded in 2008 by industry leaders in risk management with a proven track record in delivering cutting edge, innovative and cost-effective solutions. Brinqa’s award-winning software and cloud services are trusted by fortune 500 companies across risk disciplines such as information technology risk, vendor risk, and regulatory compliance risk. Brinqa is headquartered in Austin, Texas and has a global presence. https://www.brinqa.com/
{{{size}}}       https://www.bugcrowd.com/
{{{size}}}       CA Technologies helps customers succeed in a future where every business—from apparel to energy—is being rewritten by software. From planning to development to management to security, at CA we create software that fuels transformation for companies in the application economy. Learn more at https://www.ca.com/us.html https://www.ca.com/us.html
{{{size}}}       Cequence Security is a venture-backed cybersecurity software company founded in 2015 and based in Sunnyvale, CA. Its mission is to transform application security by consolidating multiple innovative security functions within an open, AI-powered software platform that protects customers web, mobile, and API-based applications – and supports today’s cloud-native, container-based application architectures. The company is led by industry veterans that previously held leadership positions at Palo Alto Networks and Symantec. Customers include F500 organizations across multiple vertical markets, and the solution has earned multiple industry accolades. Learn more at www.cequence.ai. https://www.cequence.ai/
{{{size}}}       Checkmarx is an Application Security software company, whose mission is to provide enterprise organizations with application security testing products and services that empower developers to deliver secure applications. Amongst the company's 1,000 customers are 5 of the world's top 10 software vendors and many Fortune 500 and government organizations. Checkmarx CxSAST is a highly accurate and flexible Source Code Analysis product that allows organizations to automatically scan a un-compiled/un-built code and identify hundreds of security vulnerabilities in the most prevalent coding languages. Learn more at www.checkmarx.com. https://www.checkmarx.com
CodeDx-logo (1) (1).png       Code Dx is committed to reducing barriers to effective application security. Our automated application vulnerability correlation and management tools help find and fix insecure code faster, with less effort and a smaller team. Focus your precious resources on developing valuable new features, and ship secure code faster and more often. For more information, please visit https://codedx.com/ https://codedx.com/
{{{size}}}       Contrast Security delivers the world’s fastest application security software that eliminates the single greatest security risk to enterprises today. Industry research shows that application security flaws are the leading source of data breaches. Contrast can be deployed, automatically discover applications and identify vulnerabilities within seven minutes. Relying on sensors instead of expensive security experts, Contrast runs continuously and is 10 times more accurate than the competition. Unlike tedious, painful and slow legacy approaches, Contrast analyzes a complete portfolio of running applications simultaneously in real-time at any scale. As a result, organizations can act faster against threats and immediately reduce risk. More information on Contrast Security can be found at http://www.contrastsecurity.com/. http://www.contrastsecurity.com/
{{{size}}}       Cybozu is a Japanese cloud computing vendor founded in 1997. Its service supports effective team collaboration hence our services are widely used from large-scaled teams like multinational enterprises to small-scaled teams like volunteer groups, clubs even families. “kintone” is one of the Cybozu’s key products released in 2011. It is called "no-code application platform" which makes work more productive through business applications. It is recognized as one of the leading vendors in” Gartner 2016 Enterprise application Platform as a Service (aPaaS), Worldwide Magic Quadrant”. Cybozu has been focusing on security enhancement. It has started "bug bounty project" in 2013 to find any vulnerabilities which may exist in its product in order to provide its customers with the most secure service possible. https://www.cybozu.com/
{{{size}}}       Dell Technologies (NYSE: DELL) unique family of businesses that helps organizations and individuals build their digital future and transform how they work and live. The company provides customers with the industry's broadest and most innovative technology and services portfolio spanning from edge to core to cloud. The Dell Technologies family includes Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream and VMware. https://www.delltechnologies.com/en-us/index.htm
{{{size}}}       Denim Group is the leading independent application security firm, serving as a trusted advisor to customers on matters of application risk and security. The company helps organizations assess and mitigate application security risk. Denim Group’s flagship ThreadFix platform accelerates the process of application vulnerability remediation, reflecting the company’s rich understanding of what it takes to fix application vulnerabilities faster. http://www.denimgroup.com
{{{size}}}       Duo Security helps defend organizations against data breaches by making security easy and effective. Duo Beyond, the company's category-defining zero-trust security platform, enables organizations to provide trusted access to all of their critical applications, for any user, from anywhere, and with any device. The company is a trusted partner to more than 10,000 customers globally, including Dresser-Rand, Etsy, Facebook, K-Swiss, Random House, Yelp, Zillow, Paramount Pictures, and more. Founded in Michigan, Duo has offices in Ann Arbor and Detroit, as well as growing hubs in Austin, Texas; San Mateo, California; and London, UK. https://duo.com/
Entrust DataCard logo.png       Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether they are making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. Solutions range from the physical world of financial cards, passports and ID cards to the digital realm of authentication, certificates, and secure communications. With more than 2,000 Entrust Datacard colleagues around the world and a network of strong global partners, the company serves customers in 150 countries worldwide. For more information, visit www.entrustdatacard.com. https://www.entrustdatacard.com/
{{{size}}}       Facebooks AppSec team is focused on discovering vulnerabilities and crafting creative solutions to eliminate them. We achieve this by doing code and design reviews, building tools, and automation, and manage our bug bounty program. Come to our booth to find out more and sign-up to win a FREE Oculus Go. https://www.facebook.com/whitehat/report/
{{{size}}}       https://www.fortinet.com/
{{{size}}}       https://www.gemalto.com/
{{{size}}}       https: / gosecure.
HERE Logo MFL Horizontal RGB.png       Mapping has always been about discovery. For centuries, two-dimensional maps guided us through the unknown to our destination. But we are no longer limited by the edges of our physical maps. In 1985, we began with the simple goal to digitize mapping and pioneer in-car navigation systems. Over the next three decades, as NAVTEQ and Nokia, we’ve built a legacy in mapping technology. Today, we're creating living three-dimensional maps that grow upwards, breathing with layers of information and insights. By partnering with world-leading automakers, we are powering 4 out of 5 in-car navigation systems in North America and Europe. But we’re not just on the road. We are capturing the world in three dimensions, readying for an autonomous future. And we’re looking beyond. From autonomous driving to the Internet of Things, we are building the future of location technology through strategic partnerships with industry leaders like Intel, NVIDIA, Mobileye, and Tencent. With headquarters in Amsterdam and development sites that span Chicago to Berlin and across to Mumbai, we are a global team with a shared passion. From data scientists and software developers to product engineers and mapping specialists, we come together from many different backgrounds to build a better future for location technology. https://www.here.com/en
{{{size}}}       We combine know-how in the areas of security consulting, IT governance, risk & compliance with conceptual strength, innovation and implementation expertise. In addition to protecting applications and networks, our core competencies also include organizational tasks such as setting up security, risk, and service management system. HiSolutions AG is one of the leading consulting specialists for IT management and information security in Germany. More than 200 experts advise in the areas of security consulting, IT governance, business continuity management, and digitalization. We actively participate in the development of national and international standards and are involved in various research projects and university teachings. https://www.hisolutions.com
{{{size}}}       High-Tech Bridge is a global provider of web and mobile Application Security Testing (AST) services. Our award-winning AST platform ImmuniWeb® combines the genius of Human Intelligence with the power of Artificial Intelligence and Machine Learning. ImmuniWeb® leverages Artificial Intelligence (AI) and Machine Learning (ML) for intelligent automation of application vulnerability scanning and acceleration of application penetration testing. High-Tech Bridge's security experts from our CREST-accredited SOC look for the most complicated application vulnerabilities and attack vectors in instant synchronization and correlation with automated vulnerability scanning. Invented by High-Tech Bridge, this type of hybrid security testing, enhanced with AI/ML, delivers the most comprehensive vulnerability detection rate, continuously reduces human intervention without impacting the quality of testing, and contractually guarantees zero false-positives to every customer. https://www.htbridge.com
{{{size}}}       Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Founded in 2002, we have enjoyed a steady history of growth and success, generating $264 million in 2016, with over 5,200 customers and more than 500 partners in 100+ countries worldwide. https://www.imperva.com/
IBI Logo.jpg       Founded in 1975, Information Builders continues to deliver state-of-the-art technology that is transforming business in all commercial industries, government, and education. We remain one the largest independent, privately held companies in the software industry. Headquartered above Madison Square Garden in New York, Information Builders operates in more than 60 global locations and has built an active customer base of tens of thousands of major installations at the world's leading organizations. Information Builders is not only a major software supplier to our customers, but also a major provider to the leading software vendors in the industry including HP, IBM, Oracle, SAP, Teradata, and many others. In addition to our commitment to superior software engineering, we are equally proud of our people. Some of the most talented and creative professionals in the industry work at Information Builders and are passionate about what they do. In fact, the professionalism and tenure of our employees is often cited as a major differentiator by our customers. Our reputation for customer service has garnered us the highest honors from “CRM” magazine, the SSPA, and the American Business Awards. Our products and services have received top recognition from independent analyst research firms including Gartner, Forrester, Ventana Research, BARC, Butler, Bloor, and The Data Warehouse Institute (TDWI). Most importantly, our customers have received the most information technology and business awards for their accomplishments. More than 50 of our customers have had their information systems inducted into the Smithsonian Institute for superior information technology achievement through the Computerworld Honors Program. http://www.informationbuilders.com/about_us http://www.informationbuilders.com
{{{size}}}       Ipswitch is an IT management software developer for small and medium-sized businesses. The company was founded in 1991 and is headquartered in Burlington, Massachusetts and has operations in Atlanta (Alpharetta) and Augusta, Georgia, American Fork, Utah, Madison, Wisconsin and Galway, Ireland. Ipswitch sells its products directly, as well as through distributors, resellers, and OEMs in the United States, Canada, Latin America, Europe, and the Pacific Rim. https://www.ipswitch.com/
{{{size}}}       IriusRisk makes DevSecOps a reality with its pioneering threat modeling and SDL risk management platform. IriusRisk is a powerful tool to ensure security is woven into the design phase and followed up into production. It operates as a central orchestration point for teams to threat model and manage risk with real-time updates throughout the SDL. Built for integration, simplicity, scale, and speed, IriusRisk is the glue to bind Security, Operations & Development together. IriusRisk is a trusted partner of some of the largest financial institutions in the world and we pride ourselves on being fast to adapt, agile, flexible, responsive and ahead of the curve. IriusRisk operates globally and stands ready to partner with you. Contact us for more information and to request a demo. www.iriusrisk.com
{{{size}}}       Johnson Controls is a global diversified technology and industrial leader serving customers in more than 150 countries. Our 130,000 employees create quality products, services, and solutions to optimize energy and operational efficiencies of buildings; lead-acid automotive batteries and advanced batteries for hybrid and electric vehicles; and seating components and systems for automobiles. Our commitment to sustainability dates back to our roots in 1885, with the invention of the first electric room thermostat. Through our growth strategies and by increasing market share we are committed to delivering value to shareholders and making our customers successful. In 2015, Corporate Responsibility Magazine recognized Johnson Controls as the #14 company in its annual “100 Best Corporate Citizens” list.” http://www.johnsoncontrols.com/content/us/en/products/building_efficiency/product-security.html
{{{size}}}       Jscrambler is the leader in JavaScript Application Integrity and the only to offer RASP capabilities to your JS applications.As JavaScript becomes the standard for building websites, hybrid mobile applications, or other application types, most of the code is still completely exposed. With Jscrambler you can make your application self-defensive and resilient to both tampering and reverse-engineering attempts. Jscrambler is trusted by hundreds of companies (including Fortune 500) around more than 130 countries and is supported by a team of JS experts. https://jscrambler.com/en/
{{{size}}}       Kenna Security provides a Risk and Vulnerability Intelligence platform that accurately measures risk and prioritizes remediation efforts before an attacker can exploit an organization’s weaknesses. Kenna accomplishes this by automating the integration of customer’s vulnerability scan data with exploit intelligence data from multiple sources, including 0-day data. Kenna then analyzes the data against active Internet breaches to identify the most critical threats before hackers can attack.  https://www.kennasecurity.com/
{{{size}}}       Kiuwan provides an end-to-end Software Analytics platform that offers objective data to make informed decisions to secure, analyze and control the entire SDLC of any application portfolio. With Kiuwan Code Security, the scope in threat mitigation is unparalleled, with over 4000+ custom rules, ability to suppress defects and create tailored action plans while meeting the most stringent industry standard requirements. In constant evolution, it boasts broad language support and integration with Jira, Jenkins, and Github to name but a few of the possibilities brought about by the platform. https://www.kiuwan.com/
{{{size}}}       ‎The Media Trust is on a mission: fixing the internet. To make the internet a healthier, more valuable place for businesses, governments and consumers, The Media Trust’s centralized platform provides real-time visibility and insight into non-compliant activity and threats operating in enterprise website and mobile app environments. With an emphasis on third-party code beyond libraries, the platform identifies all executing code (including code from first, third and nth parties), analyzes its behavior, assesses compliance with company policies, and resolves violating behavior. The ability to manage third-party digital risk helps defend against website breaches which can lead to regulatory fines, revenue loss, and reputational harm. http://mediatrust.com/
{{{size}}}       Mercari is a C2C marketplace app that makes it easy for people to safely sell and ship their things. Launched in 2013, it's now among the largest peer-to-peer selling platforms globally. From fashion to toys, shoes to electronics and beyond, Mercari's mission is to ‘create value in a global marketplace where anyone can buy and sell’. https://about.mercari.com/en/
NETSPI Logo 2017 PNG-01.png       NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. http://www.netspi.com
{{{size}}}       Only the NowSecure Platform delivers automated 360-degree coverage of mobile app security testing with the speed and depth modern enterprises require. The world’s most demanding organizations and advanced security teams trust NowSecure to identify the broadest array of security, privacy, and compliance gaps in custom, third-party, and business-critical mobile apps. https://www.nowsecure.com/
Oneconsult 2018 logo.png      ‎ Oneconsult group is your renowned Swiss cyber security services partner since 2003 with offices in Switzerland and Germany and 1500+ completed security projects worldwide. Get expert advice from an owner-managed and vendor-independent consultancy with 35+ highly qualified cyber security experts, including certified penetration testers (OPST, OPSA, OSCP, OSCE, GXPN), digital forensics specialists (GCFA, GCFE, GREM), ISO security auditors (ISO 27001 Lead Auditor, ISO 27005 Risk Manager) and dedicated IT security researchers to solve even your most demanding information security challenges. Together we address your external and internal threats such as malware infections, hacker attacks and APT as well as digital fraud and data leakage with core services like penetration tests / ethical hacking, real-life APT tests and ISO 27001 security audits. In case of emergency, One consults incident response & IT forensics team supports you with around-the-clock expert assistance (24 h x 365 days). English: https://www.oneconsult.com/en/

Deutsch: https://www.oneconsult.com/de/

link={{{link}}}       https://www.oracle.com/index.html
{{{size}}}       Since 1995 we have always developed the most up-to-date and progressive digital solutions designed to empower people. Our mission is to deploy the latest proven technology to deliver unique products with astounding performance. Our Oxford based team are responsible for delivering our full range of services which includes the design, development, hosting, supporting and testing of interactive Web Applications and websites. https://www.oxfordwebapps.co.uk/
{{{size}}}       100 years ago, Panasonic started with a desire to create things with value. Since then, the challenge has continued into various fields including home appliances to realize "A Better Life, A Better World".

Considering product security as part of quality management, we have strived to improve the security of products. Specific activities include threat analysis during the design process, and vulnerability testing before shipment. After shipment, Panasonic PSIRT: Product Security Incident Response Team works to respond to incidents toward a quick resolution. To provide products that our customers can use with peace of mind, we will continue product security initiatives.

https://www.panasonic.com/
{{{size}}}       Ping An Technology (PATech), a wholly-owned subsidiary of Ping An Group, is committed to using AI, intelligent cognition, blockchain, cloud and other cutting-edge technologies to create a new cloud-based human life. PATech is the high-tech core and tech business incubator among Ping An Group, and be responsible for the development and operation of the critical platforms and services for the Group. As an independent entity, with smart technology as a means and smart manufacturing as a blueprint, PATech focuses on the finance, healthcare and smart city areas, applies the technological capabilities certified by international authoritative certifications to actual business scenarios. http://tech.pingan.com/en/
{{{size}}}       Rakuten, Inc. and its consolidated subsidiaries and affiliates ("Rakuten Group") are full-line Internet services companies. Since its founding in 1997, Rakuten, Inc. ("Rakuten") has spent a decade evolving its business model centered on e-commerce, to create a market completely new to Japan. The Rakuten Group is focusing on two approaches, in particular, to target growth in the decade to come. The first is to empower people and society through continuous innovation and business operations based on our five concepts of success. The second is to establish a "Rakuten eco-system" which enables us to maximize our customers lifetime value and leverage synergies. Guided by the key phrase "more than Web", the Rakuten Group is taking on the challenge of creating new value by driving convergence between the Internet and traditional "bricks and mortar" businesses. http://www.rakuten.com
{{{size}}}       Salt Security makes it safe to innovate by protecting the APIs at the core of every SaaS, web, mobile, microservices and IoT application. Our API Protection Platform is deployed in minutes, and requires no configuration or customization. We use patented behavioral protection to automatically and continuously discover and learn the granular behavior of each unique API to ensure protection. The company was founded in 2016 by alumni of the Israeli Defense Forces (IDF) and serial cybersecurity executives. In 2019 Salt Security was selected as a finalist for the RSA Innovation Sandbox and as the winner of the OWASP Innovation Fair. https://salt.security/
{{{size}}}       SCSK provides a full lineup of services to support any area of IT solution required for businesses from system integration to IT infrastructure implementation, IT management, BPO(business process outsourcing), and IT hardware and software sales.In addition, we take advantage of the capability to support a global IT system network for customers including Sumitomo Corporation, aiming for further leaps ahead as a global IT services company. http://www.scsk.jp/index_en.html
{{{size}}}       ‎ SecureBrain (A Hitachi Group Company) is a leader in providing software and services to help protect enterprises and their customers against cybercrime including online fraud and malware attacks.

To ensure that our customers are always protected from the latest trend of cybercrime, SecureBrain has its own advanced security research center. Team of security researchers works closely with many Japanese government research agencies to research and develop solutions against the latest cyber threats.

https://www.securebrain.co.jp/eng/
{{{size}}}       Security Journey is the leader in application security education using security belt programs. We guide our clients – many in tech, healthcare, and finance – to building long-term, sustainable application security culture. We incorporate everything you need to deploy and manage an education program.

Our cloud-based platform delivers application security lessons from an ever-growing library of content, provides hands-on, immersive experiments, measures student and organizational growth, rewards student achievements, and transforms an enterprise’s security culture. We promote security awareness organization-wide with learning that is engaging, motivating, and fun. In short, we provide security education developers, testers, and managers love.

https://www.securityjourney.com/
{{{size}}}       Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organization by making security highly visible and providing them with the skills and tools to write secure code from the beginning. We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and the Asia Pacific. To learn more, visit https://securecodewarrior.com. https://securecodewarrior.com/
{{{size}}}       Security Compass is a leader in helping customers proactively manage cybersecurity risk without slowing down their business. Offering Advisory Services, Training, and SD Elements, an award-winning policy to procedure platform for security and compliance. Security Compass enables organizations to rapidly and efficiently deliver technology that's secure by design. Security Compass serves some of the world's largest businesses including seven of the 15 largest financial institutions and four of the 10 largest technology companies in North America. http://www.securitycompass.com
{{{size}}}       Security Innovation is a pioneer in software security and trusted advisor to its clients. Since 2002, organizations have relied on our assessment and training solutions to make the use of software systems safer in the most challenging environments – whether in Web applications, IoT devices, or the cloud. The company’s flagship product, CMD+CTRL Cyber Range, is the industry’s only simulated Web site environment designed to build the skills teams need to protect the enterprise where it is most vulnerable – at the application layer. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter. https://securityinnovation.com
{{{size}}}       ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle. It combines next-generation static code analysis (to quickly and accurately identify vulnerabilities) with application instrumentation (to protect the application) in an automated workflow. This combination of runtime-informed code analysis and code- informed runtime protection delivers the most accurate, automated, and comprehensive application security solution. https://blog.shiftleft.io/
{{{size}}}       There are a staggering volume and variety of open source and third-party component parts flowing through every development environment in the world. If properly sourced and managed, these components are a tremendous source of energy for accelerating innovation. If not, they lead directly to security vulnerabilities, licensing risks, enormous rework, and waste. With over 120,000 installations and counting, Sonatype’s Nexus products are helping modern development organizations intelligently source, manage, assemble, and maintain open-source and third-party components, so they can improve the quality, security, and speed of their software supply chains. http://www.sonatype.com
{{{size}}}       StackHawk is dynamic application vulnerability scanning built for modern development teams. With simple configuration, easy invocation via docker command, and interpretable results, StackHawk is built for developers to take control of their AppSec. Learn more at docs.stackhawk.com. https://www.stackhawk.com/
{{{size}}}       Snyk is a developer-first security solution that helps you use open source code and stay secure. Building on its unique vulnerability database, Snyk continuously finds and fixes known vulnerabilities & license violations in open source dependencies and containers. Snyk integrates seamlessly into the developers’ workflow and enables them to own the open source security of their code thus supporting security at scale. https://snyk.io/
{{{size}}}       SpringCM delivers an innovative document workflow and management platform, powering the leading contract management application. SpringCM empowers companies to become more productive by reducing the time spent managing mission-critical business documents. Intelligent, automated workflows enable document collaboration across an organization from any desktop or mobile device. Delivered through a secure cloud platform, SpringCM’s document and contract management solutions work seamlessly with Salesforce or as a standalone solution. Every day, more than 600 companies use SpringCM to improve customer experience and get more done, faster. For more information about SpringCM, visit www.springcm.com. https://developer.springcm.com/
{{{size}}}       Symantec Corporation (NASDAQ: SYMC), the world’s leading cybersecurity company, helps organizations, governments, and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud, and infrastructure. Likewise, a global community of more than 50 million people and families rely on Symantec’s Norton and LifeLock product suites to protect their digital lives at home and across their devices. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For more information, please visit www.symantec.com. https://www.symantec.com
{{{size}}}       Synopsys technology is at the heart of innovations that are changing the way we live and work. The Internet of Things. Autonomous cars. Wearables. Smart medical devices. Secure financial services. Machine learning and computer vision. These breakthroughs are ushering in the era of Smart, Secure Everything―where devices are getting smarter, everything’s connected, and everything must be secure. Powering this new era of technology are advanced silicon chips, which are made even smarter by the remarkable software that drives them. Synopsys is at the forefront of Smart, Secure Everything with the world’s most advanced tools for silicon chip design, verification, IP integration, and application security testing. Our technology helps customers innovate from Silicon to Software, so they can deliver Smart, Secure Everything. https://www.synopsys.com/
{{{size}}}       tCell moves application security out of the network for cloud-first organizations. Using advanced runtime application self-protection technology, tCell protects applications in-production from XSS, Commandi, SQLi, Account Takeover, and OWASP Top 10 attacks. Whether an organizations’ applications are on-premises or cloud-based, tCell's unique approach makes application security easy. https://www.tcell.io/
ThoughtWorks Logo.png       We are a software company and community of passionate, purpose-led individuals. We think disruptively to deliver technology that addresses our clients’ toughest challenges, all while seeking to revolutionize the IT industry and create positive social change. ThoughtWorks' 3,000 professionals serve clients from offices in Australia, Brazil, Canada, China, Ecuador, Germany, India, Italy, Singapore, South Africa, Turkey, Uganda, the United Kingdom, and the United States. ThoughtWorks releases a regular technology radar, a study that looks at the key trends that impact software development and business strategies. The Radar helps companies stay on top of topics that are constantly evolving, such as security, and offers insight and practical tools to build secure systems at every stage of the development process. http://www.thoughtworks.com/
{{{size}}}       Twistlock is the most complete, automated and scalable cloud native cybersecurity platform. Trusted by hundreds of customers worldwide, Twistlock uses the strengths of cloud native to provide better security for teams using Docker, Kubernetes, Lambda, Fargate, and other modern technologies. https://www.twistlock.com/
{{{size}}}       UBsecure is a leading web application security company based in Japan since 2007. We offer various security solutions for web application and smartphone application by utilizing in-house developed application security testing tool, Vex. Vex built by a tremendous amount of experience in professional security scanning and by its continuous feedback. The unique characteristic of the tool is that it used as a stand-alone security testing tool as well as the seamless security testing component within the SDLC. Therefore, Vex is not only for professional security auditors but also for software developers who need secure development cycles. Please visit our site for more information about Vex. https://vex.ubsecure.jp/lpen
{{{size}}}       https://www.ups.com/us/en/Home.page
{{{size}}}       Veracode gives companies a comprehensive view of security defects so they can create secure software, and ensure the software they are buying or downloading is free of vulnerabilities. As a result, companies using Veracode are free to boldly innovate, explore, discover, and change the world. https://www.veracode.com/
{{{size}}}       Verizon Digital Media Services offers a global, PCI-compliant content delivery network to protect websites, applications and user data at every layer. Integrated with our industry-leading platform, our Cloud Security Solution offers world-class protection, performance and scale to keep your business online. Our network features:
  • An advanced Web Application Firewall (WAF) to protect web applications against attacks
  • Robust DDoS protection with massive capacity to thwart the largest attacks
  • Bot mitigation to defend against automated threats and bad bots
  • Added protection for web servers to defend against direct-to-origin attacks
  • Built-in DNS protection with DNSSEC to prevent injection of fraudulent records
  • A security operations team ready to provide a fully managed security offering

Contact us today to learn more about our Cloud Security Solution or visit us at www.verizondigitalmedia.com.

https://www.verizondigitalmedia.com/platform/edgecast-cdn/security/
{{{size}}}       The Waratek ARMR Platform provides unique protection in the applications runtime environment. This unique security layer provides fast and accurate security in the compilation pipeline, providing protection that becomes part of your application – but never requires changes to source code.

● Instantly apply code equivalent security patches to Java and .NET applications ● Actively secure against the OWASP Top Ten / SANS 25 / Zero-Day vulnerabilities ● Virtually upgrade & secure out-of-support, vulnerable Java applications. All with no source code changes or False Positives.

http://www.waratek.com/
Wallarm Logo (1).png       Wallarm delivers automated cloud-native application and API security throughout application development and deployment lifecycle.

Wallarm AI-powered Application Security Platform includes FAST for CI/CD-integrated security test automation during development and Advanced WAF attack blocking and vulnerability protection after deployment. Wallarm platform aligns security and development into a unified pipeline:

  1. Detects OWASP Top 10, 0 day and behavioral issues
  2. Provides highly accurate detection based on patent-pending technology
  3. Improves security test coverage by automatically generating and running tests
  4. Automates issue management with deep learning, policies and build in active rechecker
  5. Provide easy-to-manage multi-tenant multi-application unified management platform
https://wallarm.com/
{{{size}}}       WhiteHat Security is the leader in application security, enabling businesses to protect critical data, ensure compliance, and manage risk. Through a combination of technology, over a decade of intelligence metrics, and the judgment of people, WhiteHat Security provides complete web security at a scale and accuracy unmatched in the industry. https://www.whitehatsec.com
{{{size}}}       WhiteSource helps software security teams manage open source components used in their products, automatically and continuously. It becomes part of your SDLC and automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components. https://www.whitesourcesoftware.com