This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Corporate Supporter Bios"

From OWASP
Jump to: navigation, search
Line 100: Line 100:
 
| {{MemberLinks|link=http://www.quotium.com|logo=Quotium_with_Seeker_Logo.png‎‎}} ||Quotium Technologies is an [http://www.quotium.com/prod/security.php Interactive Application Security Testing] Interactive Application Security Testing</a> technology pioneer with the release of its innovative software <b>Seeker®</b>. Seeker's technology increases the accuracy of vulnerability assessment by combining the detection of a potential vulnerability with verification through a real-time exploit attempt. Seeker dynamically analyzes the application's source code as it runs and its interaction with data across all the application. The result is the identification of complex vulnerabilities and logical flaws not detectable with any other technology. Seeker's “What You See is What You Need to Fix” approach, ranks vulnerabilities by their impacts on data and provides users with focused information to fix the security flaws, including vulnerable lines of code and a video demonstrating the actual attack on the tested application. Seeker can be used without any knowledge of security; it delivers immediate results and integrates in any existing processes. Quotium Technologies as been recognized in 2011 as a Cool vendor by Gartner in Infrastructure Protection and has won several awards in the security field since then. Quotium's products answer the needs of enterprise customers, with over 200 active references. The company is strongly oriented towards innovation with 50% of its staffing allocated to R&D. For more information about Quotium and Seeker visit our website http://www.quotium.com ||http://www.quotium.com
 
| {{MemberLinks|link=http://www.quotium.com|logo=Quotium_with_Seeker_Logo.png‎‎}} ||Quotium Technologies is an [http://www.quotium.com/prod/security.php Interactive Application Security Testing] Interactive Application Security Testing</a> technology pioneer with the release of its innovative software <b>Seeker®</b>. Seeker's technology increases the accuracy of vulnerability assessment by combining the detection of a potential vulnerability with verification through a real-time exploit attempt. Seeker dynamically analyzes the application's source code as it runs and its interaction with data across all the application. The result is the identification of complex vulnerabilities and logical flaws not detectable with any other technology. Seeker's “What You See is What You Need to Fix” approach, ranks vulnerabilities by their impacts on data and provides users with focused information to fix the security flaws, including vulnerable lines of code and a video demonstrating the actual attack on the tested application. Seeker can be used without any knowledge of security; it delivers immediate results and integrates in any existing processes. Quotium Technologies as been recognized in 2011 as a Cool vendor by Gartner in Infrastructure Protection and has won several awards in the security field since then. Quotium's products answer the needs of enterprise customers, with over 200 active references. The company is strongly oriented towards innovation with 50% of its staffing allocated to R&D. For more information about Quotium and Seeker visit our website http://www.quotium.com ||http://www.quotium.com
 
|-
 
|-
| {{MemberLinks|link=http://www.rakuten.com|logo=Rakuten-Global-150x45_72dpi.JPG}} || ||http://www.rakuten.com
+
| {{MemberLinks|link=http://www.rakuten.com|logo=Rakuten-Global-150x45_72dpi.JPG}} || ||http://www.rakuten.com ||
 
|-
 
|-
| {{MemberLinks|link=http://www.ranorex.com|logo=Ranorex_Logo.pdf|size=150x45px}} ||Ranorex is a software development company that provides innovative software testing solutions to thousands of companies and education institutions around the world. Ranorex offers a comprehensive range of test automation tools for developing and managing the testing of any desktop, web or mobile application. Ranorex is dedicated to fundamentally improving the quality of software. The Ranorex test automation tools allow both testers and developers to thoroughly test applications from a user´s perspective, making bugs easier to identify and eliminate. Ranorex is cost effective – it’s based on standard programming techniques and common languages such as C# and VB.NET. The tools allow test automation for a variety of environments, devices and applications. Currently supported technologies include .NET, Winforms, WPF, Java, SAP, HTML5, Flash, Flex, Silverlight, iOS, Android, Windows Mobile (native/hybrid) and many more. Out of the box robust test automation based on Ranorex´s market leading GUI object recognition, script-free testing for non-programmers, seamless integration into existing environments and click & go test reports are a few of Ranorex´s features. Due to its ease of use, increased testing accuracy and low cost per seat, Ranorex is an excellent choice for software development teams of virtually any size or level of sophistication. ||http://www.ranorex.com
+
||{{MemberLinksv2|link=http://www.ranorex.com|logo=Ranorex_Logo.pdf|size=150x45px}} || Ranorex is a software development company that provides innovative software testing solutions to thousands of companies and education institutions around the world. Ranorex offers a comprehensive range of test automation tools for developing and managing the testing of any desktop, web or mobile application. Ranorex is dedicated to fundamentally improving the quality of software. The Ranorex test automation tools allow both testers and developers to thoroughly test applications from a user´s perspective, making bugs easier to identify and eliminate. Ranorex is cost effective – it’s based on standard programming techniques and common languages such as C# and VB.NET. The tools allow test automation for a variety of environments, devices and applications. Currently supported technologies include .NET, Winforms, WPF, Java, SAP, HTML5, Flash, Flex, Silverlight, iOS, Android, Windows Mobile (native/hybrid) and many more. Out of the box robust test automation based on Ranorex´s market leading GUI object recognition, script-free testing for non-programmers, seamless integration into existing environments and click & go test reports are a few of Ranorex´s features. Due to its ease of use, increased testing accuracy and low cost per seat, Ranorex is an excellent choice for software development teams of virtually any size or level of sophistication. ||http://www.ranorex.com
 
|-
 
|-
 
| {{MemberLinks|link=http://www.riverbed.com|logo=Riverbed_Logo.png‎}} ||Riverbed Technology delivers application performance for the globally connected enterprise. With Riverbed, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery without fear of compromising performance. By giving enterprises the platform they need to understand, optimize and consolidate their IT, Riverbed helps enterprises to build a fast, fluid and dynamic IT architecture that aligns with the business needs of the organization. Additional information about Riverbed (RVBD) is available at www.riverbed.com. || http://www.riverbed.com
 
| {{MemberLinks|link=http://www.riverbed.com|logo=Riverbed_Logo.png‎}} ||Riverbed Technology delivers application performance for the globally connected enterprise. With Riverbed, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery without fear of compromising performance. By giving enterprises the platform they need to understand, optimize and consolidate their IT, Riverbed helps enterprises to build a fast, fluid and dynamic IT architecture that aligns with the business needs of the organization. Additional information about Riverbed (RVBD) is available at www.riverbed.com. || http://www.riverbed.com

Revision as of 04:40, 19 August 2014

Disclaimer: Corporate Supporter Bios are not endorsements and reflect the message of the supporter only.

We support a worldwide clientele with critical applications in the government, defense, financial, healthcare, services and retail sectors.
Company Company Description Contact
Accuvant_150x45.png        Accuvant is a leading provider of information security services and solutions serving enterprise-class organizations across North America. The company offers a full suite of service capabilities to help businesses, governments and educational institutions define their security strategies, identify and remediate threats and risks, select and deploy the right technology and achieve operational readiness to protect their organizations from malicious attack. Headquartered in Denver, Colorado, Accuvant has offices across the United States and Canada. Founded in 2002, Accuvant has been named to the Inc. 500/5000 list of fastest growing companies for the last seven consecutive years. For more information about Accuvant, visit Accuvant’s website at www.accuvant.com. http://www.accuvant.com
Acunetix_logo_200.png        Acunetix’s team of experienced engineers developed a lead in website, web application, and Internet-facing server analysis and vulnerability detection. Available both on-premise and online, Acunetix uses deep crawling techniques to detect exploitable vulnerabilities such as SQL injection, and all forms of Cross-Site scripting – while providing concise vulnerability reports and information on how to fix them allowing you to protect your business against impending hacker attacks. Acunetix customers include Cisco, NASA, American Express, Sony, HSBC, The Pentagon, Skype, and many more. You can find us online at www.acunetix.com. http://www.acunetix.com
Adobe_logo_standard_for_Tasha.jpg        http://www.adobe.com/
Adp.jpg        ADP® (NASDAQ: ADP), with more than $10 billion in revenues and approximately 600,000 clients, is one of the world's largest providers of business outsourcing and human capital management solutions. Leveraging over 60 years of experience and a global footprint spanning more than 40 countries, ADP offers a wide range of human resource, payroll, talent management, tax and benefits administration solutions from a single source, and helps clients comply with regulatory and legislative changes, such as the Affordable Care Act (ACA). ADP's easy-to-use solutions for employers provide superior value to companies of all types and sizes. ADP is also a leading provider of integrated computing solutions to auto, truck, motorcycle, marine, recreational vehicle, and heavy equipment dealers throughout the world. For more information about ADP or to contact a local ADP sales office, reach us at 1.800.225.5237 or visit the company's Web site at www.adp.com. http://www.adp.com
Architectgroup_130131.png        ArchitectGroup, Inc. is one of the leading consulting providers of Information Technology services and business solutions in South Korea and China. Enterprise professionals service clients across diverse industries Telecommunication, Banking, Insurance, and Semi-conductor at major company like Samsung, GM, KT, Hyundai and LG etc…. Our vision is to achieve global IT services leadership in providing value-added high quality IT solutions to our clients in selected horizontal and vertical segments, by combining technology skills, domain expertise, process focus and a commitment to long-term client relationships. ArchitectGroup has a major focus on providing services on and around Security Service Engineering *Security Testing and Management Tool *Security Vulnerability Management Platform *Mobile Security Tool Other Services include:* Application Security Engineering Service *IT Infrastructure Management Services *Embedded Security Expert Program http://www.architectgroup.com
Arxan_Logo_for_OWASP-_Resized.jpg        Arxan protects the App Economy from attacks in distributed or untrusted environments with the world's strongest and most deployed application integrity protection products. Among today’s diverse computing platforms, mobile and tablet apps and packaged or embedded software are all exposed to hacking attacks such as reverse-engineering, tampering, insertion of malware/exploits, repackaging, fraud, intellectual property theft, and piracy. Arxan's unique patented Guarding technology enables sensitive or high-value applications to proactively guard their own integrity by defending, detecting, alerting, and reacting to hacking attacks through a risk-based, customized protection. Arxan’s self-defending and tamper-proof applications are deployed on more than 200 million devices by leading Fortune 500 organizations in high-tech, ISV, financial services, digital media, gaming, healthcare, and other industries. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. Visit us at www.arxan.com. http://www.arxan.com
Aspect_Logo.png        Aspect Security, founded in 2002, is a consulting firm focused exclusively on application security products and services. We help ensure that the software that drives business is protected against hackers. Aspect’s Security Engineers analyze, test and validate approximately 5,000,000 lines of code a month, most of which are critical to the national infrastructure. Our work unearths over 10,000 vulnerabilities every year across a wide range of technologies and architectures. Our recommendations dramatically improve our clients’ security posture. We support a worldwide clientele with critical applications in the government, defense, financial, healthcare, services and retail sectors. Our educational division has taught tens of thousands of people around the world how to build, test, and deploy secure applications, making us a world leader in application security training. Flexible delivery options include instructor-led training either in-person or via webcast, or, on-demand through our innovative eLearning curriculum. Aspect Security’s principals are pioneers in the field, having started one of the world’s first application security practices in 1998. They conceived of several industry-leading standards, such the OWASP Top Ten, WebGoat, the Application Security Verification Standard (ASVS), Risk Rating Methodology and Enterprise Security API (ESAPI). These free and open materials are downloaded over 50,000 times a month. We are a founding member of the Open Web Application Security Project (OWASP) in support of educating organizations about the ever-changing threat landscape and how to properly build and secure applications. Headquartered in Columbia, MD, our personnel are located throughout the United States serving our worldwide clientele. https://www.aspectsecurity.com
Astech.jpg        http://www.astechconsulting.com
Bccriskadvisory_logo_for_owasp_acknowlegements_webpage_150_by_45px.png        BCC Risk Advisory (BCCRA) is an international security services company specializing in Application & Network security, Information Security Risk Management and Compliance. BCCRA’s clients include some of the world’s most well-known brands in financial services, social networking, software development and media. BCCRA’s security specialists work with clients to assess risk and then design, build and maintain secure applications, networks and processes. BCCRA also delivers a SaaS (Security as a Service) solution called edgescan.com. edgescan™ is a continuous network and application security vulnerability management service which acts as a “Digital Security Radar™”; coupling manual validation and human intelligence real-time vulnerability information and reporting/metrics on demand. http://www.bccriskadvisory.com
BestBuy_Logo_Resized.png        Best Buy Co., Inc.(NYSE: BBY) is a leading multi-channel global retailer and developer of technology products and services. Every day our employees - 180,000 strong - are committed to helping deliver the technology solutions that enable easy access to people, knowledge, ideas and fun. We are keenly aware of our role and impact on the world, and we are committed to developing and implementing business strategies that bring sustainable technology solutions to our consumers and communities. For information about Best Buy, visit www.bby.com or to shop online please visit www.bestbuy.com http://www.bestbuy.com
Blackhat-black.png        Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience. https://www.blackhat.com/
Bah-color.PNG        Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. Today, Booz Allen is a leading provider of management and technology consulting services to the US government in defense, intelligence, and civil markets, and to major corporations, institutions, and not-for-profit organizations. In the commercial sector, the firm focuses on leveraging its existing expertise for clients in the financial services, healthcare, and energy markets, and to international clients in the Middle East. Booz Allen offers clients deep functional knowledge spanning strategy and organization, engineering and operations, technology, and analytics—which it combines with specialized expertise in clients’ mission and domain areas to help solve their toughest problems. The firm’s management consulting heritage is the basis for its unique collaborative culture and operating model, enabling Booz Allen to anticipate needs and opportunities, rapidly deploy talent and resources, and deliver enduring results. By combining a consultant’s problem-solving orientation with deep technical knowledge and strong execution, Booz Allen helps clients achieve success in their most critical missions—as evidenced by the firm’s many client relationships that span decades. Booz Allen helps shape thinking and prepare for future developments in areas of national importance, including cybersecurity, homeland security, healthcare, and information technology. Booz Allen is headquartered in McLean, Virginia, employs approximately 25,000 people, and had revenue of $5.86 billion for the 12 months ended March 31, 2012. Fortune has named Booz Allen one of its “100 Best Companies to Work For” for eight consecutive years. Working Mother has ranked the firm among its “100 Best Companies for Working Mothers” annually since 1999. More information is available at www.boozallen.com. (NYSE: BAH) http://www.boozallen.com
Checkmarx_logo_resized.png        Checkmarx is the developer of next generation Static Code Analysis (SCA) solutions.The company pioneered the concept of a query language-based solution for identifying technical and logical code vulnerabilities.Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC) which systematically eliminates software risk. The SAST solution streamlines the workflow of key stakeholders in the software development process, increasing their effectiveness in finding problems and reducing the need for costly professional services. The product enables developers and auditors to easily scan uncompiled / unbuilt code in all major coding languages anywhere, anytime. For CISOs, it means that securing applications in the enterprise is finally practical and achievable. Application security testing is available in both On Premise and On Demand configurations. The security testing scans for the most prevalent security vulnerabilities as determined by OWASP Top 10, SANS, and other major standards. Checkmarx was recognized by Gartner as sole visionary in their latest SAST magic quadrant and as Cool vendor in application security.Customers include multiple Fortune 500, government organizations and SMBs http://www.checkmarx.com
Cigital_OWASP.GIF        Cigital, Inc. is the leading software security consulting firm in the world. Established in 1992, Cigital plans and implements initiatives that help organizations ensure their applications are secure and reliable while also improving how they build and deploy software. Our recognized experts apply a combination of proven methodologies, tools, and best practices to meet each client’s unique requirements. Cigital is headquartered outside Washington, D.C. with regional offices in the U.S., Europe, and India. http://www.cigital.com
Cloudfair_logo.png        CloudFlare, Inc. (www.cloudflare.com / @cloudflare) makes sites twice as fast, protects them from attacks, ensures they are always online, and makes it simple to add web apps with a single click. CloudFlare supercharges websites regardless of size or platform with no need to add hardware, install software, or change a line of code. The CloudFlare community gets stronger as it grows; every new site makes the network smarter. Thanks to our awesome sauce technology, every month hundreds of millions of people experience a faster, safer, better Internet. CloudFlare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company of the Year for 2011 and 2012 by the Wall Street Journal, and ranked among the world's 50 most innovative companies of 2012 by Fast Company. CloudFlare is based in San Francisco, California, USA. http://www.cloudflare.com
Cloud_Passage_Logo.png        CloudPassage is the leading provider of public and private cloud infrastructure security and creator of Halo®, the industry's first security and compliance automation platform purpose-built for elastic cloud environments. Industry-leading companies like RightScale, MuleSoft, Taulia, Bandwidth.com, and Martini Media trust Halo to seamlessly automate infrastructure security and compliance with standards like PCI, FFIEC, and HIPAA. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital, Shasta Ventures, and other leading investors. For more information, please visit http://www.cloudpassage.com. http://www.cloudpassage.com
Coalfire_Labs_Logo_Resized.png        Coalfire Labs provides technical testing services that allow our clients to gain a deep understanding of the effectiveness of their security controls at all levels: across networks, applications, embedded devices, and people. Coalfire Lab’s highly skilled professionals combine best of breed assessment technology with unmatched analysis capabilities when performing application security analysis, penetration testing, social engineering or digital forensics. Coalfire Labs is a division of Coalfire Systems, a fast-growing IT Governance, Risk and Compliance (IT GRC) firm, serving as a trusted advisor and IT GRC tools-provider to security-conscious leaders in Retail, Financial Services, Healthcare, Hospitality, Higher Education, Government and Utilities. We help our clients recognize and control IT-related risks and maintain compliance with all major industry and government standards. http://www.coalfire.com/Services/Coalfire-Labs
Coverity_Logo.png        Coverity, Inc., a Synopsys company (Nasdaq:SNPS), is a leading provider of software quality and security testing solutions. Coverity’s award-winning development testing platform helps developers create and deliver better software, faster, by automatically testing source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic system failure. The world’s largest brands rely on Coverity to help ensure the quality, safety and security of their products and services. For more information, visit www.coverity.com, follow us on Twitter or check out our blog. http://www.coverity.com/
Dbapp_logo.jpg        DBAPPSecurity, Inc. OWASP global partner. A well known company focused on WEB Application security and Data security. They have hundreds of customers including many fortune 500, which cover the field like Financial, Telecom, Energy, Government etc. The products include WEB application vulnerability scanner, Database vulnerability scanner, WEB application firewall, Database Auditor and Log Auditor. They have very competitive solution for Data leakage, WEB defense, Compliance, and Cloud security. They also have well known security research team. http://www.dbappsecurity.com
Denim_Group_Logo.gif        Denim Group is a custom software development firm skilled in large-scale development projects across multiple platforms, languages and applications. What makes Denim Group unique is that the company brings significant core competencies in software security to the table, offering an innovative blend of secure software development, testing and training capabilities that protect a company’s biggest asset, its data. Denim Group customers span an international client base of commercial and public sector organizations across the financial services, banking, insurance, healthcare and defense industries. Its depth of experience building large-scale software development systems in a secure fashion has made the company's leaders recognized experts in their fields. Denim Group has been recognized as one of the 5,000 Fastest Growing Company's by Inc. Magazine several years in a row, and has won multiple awards including its recent accolades as one of the best places to work in San Antonio. http://www.denimgroup.com
Dropbox_resized_logo.png        Dropbox simplifies the work and personal lives of millions of people by letting them securely bring their documents, photos, and videos anywhere and share them easily. The service is used by more than 200 million people and 4 million businesses, with over 1 billion files saved per day. For more information, visit https://www.dropbox.com/press. https://www.dropbox.com/news
ELearnSecurity_owasp_150-45.png        Based in Pisa, Italy, eLearnSecurity is a leading provider of IT security and penetration testing courses for IT professionals. eLearnSecurity's mission is to advance the career of IT security professionals by providing affordable and comprehensive education. All eLearnSecurity courses utilize engaging eLearning and the most effective mix of theory, practice and methodology in IT security - all with real-world lessons that students can immediately apply to build relevant skills and keep their organization's data and systems safe. eLearnSecurity has proven to be a leading innovator in the field of practical security training. Best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework, Hack.me and Hera Network Security Lab, has changed the way students learn and practice new skills. Twitter handle: @elearnsecurity http://www.elearnsecurity.com
Ernst_%26_Young_Logo_Resized.png        http://www.ey.com
[FICO-logo-108px.gif        FICO (NYSE:FICO) delivers superior predictive analytics solutions that drive smarter decisions. The company's groundbreaking use of mathematics to predict consumer behavior has transformed entire industries and revolutionized the way risk is managed and products are marketed. FICO's innovative solutions include the FICO® Score — the standard measure of consumer credit risk in the United States — along with industry-leading solutions for managing credit accounts, identifying and minimizing the impact of fraud, and customizing consumer offers with pinpoint accuracy. Most of the world's top banks, as well as leading insurers, retailers, pharmaceutical businesses and government agencies rely on FICO solutions to accelerate growth, control risk, boost profits and meet regulatory and competitive demands. FICO also helps millions of individuals manage their personal credit health through www.myFICO.com. Founded in 1956, FICO introduced analytic solutions such as credit scoring that have made credit more widely available, not just in the United States but around the world. We have pioneered the development and application of critical technologies behind decision management. These include predictive analytics, business rules management and optimization. We use these technologies to help businesses improve the precision, consistency and agility of their complex, high–volume decisions. http://www.fico.com
Fishnet_Logo_AppSec.jpg        FishNet Security is the No. 1 provider of information security solutions that combine technology, services, support, and training. We are the only nationally focused information security solutions provider with a full suite of professional services in Information Assurance, Security Integration, 24x7 Support, Managed Services, and Training. Since 1996, we have been providing our clients with solutions to help them effectively manage risk, meet compliance requirements, and reduce cost, while maximizing security effectiveness and operational efficiency.Our commitment to information security excellence is unparalleled. We distinguish ourselves with the most comprehensive offering available in the market and a track record of delivering quality solutions to over 5,000 clients nationwide, FORTUNE 500 companies and global institutions alike. We serve customers in various industries, such as financial services, healthcare, government, retail, and technology.FishNet Security provides consulting services in a broad base of relevant information security domains. We have mature and established consulting practices that focus on the following: PCI Compliance, Governance, Risk, and Compliance, Incident Management, Security Assessment, Application Security, Network Security, Data Security and Privacy, Enterprise Mobility, and Identity and Access Management. Our Professional Services team is powered by experienced consultants that possess numerous certification designations, including CISSP, CISM, CISA, ISO Lead Auditor, PCI QSA, PCI PAQSA, NSA-IAM, and countless product-focused certifications. We actively grow, recruit, and retain the industry’s best security talent. We differentiate our services by providing security solutions that combine business acumen, technical expertise, real-world experience, and outstanding customer service. Our thought leadership is greatly valued by the security community and frequently featured in many publications and national conferences. Our company has experienced tremendous growth in the last few years and we expect to continue growing at that same pace. We will remain at the forefront in providing security solutions to our customers and enabling them to conduct their business successfully and securely. http://www.fishnetsecurity.com
Gemalto_brand.jpg        About Gemalto: the world leader in digital security In an increasingly connected society, Gemalto is the leader in making digital interactions secure and easy Gemalto is at the heart of our evolving digital society. Billions of people worldwide increasingly want the freedom to communicate, travel, shop, bank, entertain and work – anytime, anywhere – in ways that are convenient, enjoyable and secure. We deliver on their expanding needs for personal mobile services, identity protection, payment security, authenticated online services, cloud computing access, modern transportation, M2M communication, eHealthcare and eGovernment services.Our expertise spans the entire process for creating digital security solutions that embed the trust of our clients and their customers. We develop secure operating systems and run them on trusted devices – like UICC and smart cards, banking cards, ePassports, eID cards, tokens and other devices – which we assemble and personalize. We deploy the software for managing these, and the services they enable, throughout their life-cycle. And we innovate so our clients can offer more ways of enhancing the convenience and security of their end-users’ digital lives. http://www.gemalto.com
GDS_LOGO_SMALL.jpg        Gotham Digital Science (GDS) is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management. GDS clients number among the largest financial services institutions and software development companies in the world. GDS security specialists work with clients to assess risk and then design, build, and maintain secure applications, networks, and processes. With offices located in New York City and London, GDS seamlessly and efficiently assists clients with operations on both sides of the Atlantic. GDS is a member of CREST, the Council of Registered Ethical Security Testers, as well as a member of the UK Government CHECK scheme, allowing GDS to provide security assurance services to Her Majesty's Government and UK Critical National Infrastructure on systems processing protectively marked information. http://www.gdssecurity.com
Imperva_2color_RGB.jpg        http://www.imperva.com
IBI_Logo.jpg        Founded in 1975, Information Builders continues to deliver state-of-the-art technology that is transforming business in all commercial industries, government, and education. We remain one the largest independent, privately held companies in the software industry. Headquartered above Madison Square Garden in New York, Information Builders operates in more than 60 global locations and has built an active customer base of tens of thousands of major installations at the world's leading organizations. Information Builders is not only a major software supplier to our customers, but also a major provider to the leading software vendors in the industry including HP, IBM, Oracle, SAP, Teradata, and many others. In addition to our commitment to superior software engineering, we are equally proud of our people. Some of the most talented and creative professionals in the industry work at Information Builders and are passionate about what they do. In fact, the professionalism and tenure of our employees is often cited as a major differentiator by our customers. Our reputation for customer service has garnered us the highest honors from “CRM” magazine,the SSPA,and the American Business Awards. Our products and services have received top recognition from independent analyst research firms including Gartner, Forrester, Ventana Research, BARC, Butler, Bloor,and The Data Warehouse Institute (TDWI). Most importantly, our customers have received the most information technology and business awards for their accomplishments. More than 50 of our customers have had their information systems inducted into the Smithsonian Institute for superior information technology achievement through the Computerworld Honors Program. http://www.informationbuilders.com/about_us
IpswitchFT_logo_138-80.png        Ipswitch File Transfer was founded on a simple premise: to produce IT software that took what was possible and made it practical. Ipswitch File Transfer brings this vision to life by delivering high-performance integration and managed file transfer solutions to help customers manage a broad spectrum of business interactions – from enterprise application integration to mission critical data transfers to person-to-person file exchanges. These products help our customers reduce the risks associated with the movement of sensitive data, meet compliance requirements, gain visibility and control of file movement, and improve operational efficiency. Ipswitch File Transfer has more than 10,000 customers in over 100 countries, including more than 90 percent of Fortune 1000 enterprises, the majority of government agencies, and millions of users in healthcare, finance, retail and other industries. http://www.IpswitchFT.com
Lynx_Logo.png        Lynx Technology Partners provides consultants experienced in the selection, design and implementation of multiple security technologies. We have delivered extensive services including: web application ethical hacking, penetration testing, vulnerability assessments, security feasibility studies, product selection, post implementation security testing, and security management. Our firm is based on four cornerstones that enable us to deliver consistent value worldwide: 1. Industry focused security professionals 2. Multidisciplinary and uniquelly brilliant teams 3. Exceptional methodologies and secure tools 4. An integrated network of global security resources Whether you are looking to securely re-engineer your infrastructure, prepare for an internal audit, evaluating new security technologies or simply ‘harden’ existing systems, we have the skills to assist you. http://lynxtp.com
MONITORAPP_Logo.png        MONITORAPP Co., Ltd, founded in 2005, is specialized in application security solution. We performs R&D for various application acceleration technology and application security technology based on high performance application proxy technology to ensure fast and safe application delivery. We emphasize to create the best solution for our customers. MONITORAPP’s APPLICATION INSIGHT solution works with wherever has core application business application of corporate like Web, Database and VoIP, Unified Communication. WEB INSIGHT WAF™ is a hardware-based equipment of a gateway-type and is installed as a proxy in the network. It is a real Web firewall solution which can detect and block real-time the outside hacking attempts and the attacks exploiting the vulnerabilities of Web applications without lowering the performance of each Web server. WEB INSIGHT SWG™ is a solution that filters unwanted software, malware from user-initiated Web and regulatory policy compliance. It protects from APT attacks and evolved a variety of business from web threat attacks and defends your internal company website inside the web-enabled environment. It is certified that it is a safety appliance-based Secure Web Gateway. It provides flexibility required to meet business needs. MONITORAPP is also providing a service type of application security to meet the requirement of clouding security service. http://www.monitorapp.com
Mozilla.png        Mozilla is a proudly non-profit organization dedicated to keeping the power of the Web in people’s hands. We’re a global community of users, contributors and developers working to innovate on your behalf. When you use Firefox, or any Mozilla product, you become a part of that community, helping us build a brighter future for the Web. Link to:https://www.mozilla.org/mission/ http://www.mozilla.com
Mstar_logo.jpg        MStar Semiconductor, Inc. (“MStar”) is a world-class leader in Application Specific ICs (“ASIC”) with a focus on consumer electronic products and communication applications. Since the inception in 2002, MStar has established a strong brand and leadership position in LCD controller, analog and digital TV, set-top box, and mobile communication applications by fully leveraging its core expertise of cutting-edge design capabilities, continuous innovation and premier customer-focused services. Headquartered in Taiwan, MStar has a comprehensive global footprint with well-established R&D and customer support centers to provide a full range of total solutions for various consumer electronic applications. MStar went public in 2010 and is listed on Taiwan Stock Exchange. For more information, please visit www.mstarsemi.com. http://www.mstarsemi.com
Moki_Logo_-_Resized.png        Moki helps enterprises thrive in the app era through solutions that secure, monitor and support mobile apps. These solutions are used by enterprises across a variety of industries to create a more secure mobile app infrastructure. Moki’s mission is simple: secure mobile apps through visibility, insights and runtime security. MOBILE SECURITY Moki is developing a new type of security solution that will allow enterprises to secure their mobile apps through visibility, insights and runtime protection. MOBILE OPERATIONS Moki’s stack of mobile-ops solutions allows companies to deploy and manage any purposed-device mobilization initiative. These tools enable enterprises to create custom experiences using purposed devices and remotely manage, control and support those devices and the apps that run on them. http://moki.com
NetSparker_Logo_Resized7-3-13.png        Netsparker is an industry leading automated web application security scanner developed by Mavituna Security. Mavituna Security management and engineers have more than a decade of experience in the web application security industry that is reflected in their product, Netsparker. Netsparker is a very easy to use web application security scanner that automates most of the web application security scanning. Since an out of the box installation of Netsparker is able to scan a wide variety of web applications, web security experts, penetration testers and QA people do not need to spend countless amount of hours tweaking and configuring the security scanner. Netsparker is revolutionising web application security by being the only web application security scanner to automatically verify detected web vulnerabilities, thus reporting no false positives. http://www.mavitunasecurity.com/netsparker/
Netspi_logo.png        NetSPI is a privately held information-security consulting company founded in 2001. By using its consulting team's deep security knowledge and its CorrelatedVM vulnerability management & reporting solution, the company is a trusted advisor to large enterprises. NetSPI provides a range of assessment and advisory services designed to analyze and mitigate risks and ensure compliance with relevant regulations and industry standards. Clients include large financial services firms, retailers, healthcare organizations and technology companies. http://www.netspi.com
Nokia.jpg        http://www.nokia.com
OneConsult.jpg        Since OneConsult’s formation in 2003, our security experts have conducted several hundred application security audits of online banking solutions, online shops and mobile apps. Our company is an internationally operating, Swiss IT security auditor with headquarters in Switzerland and offices in Germany and Austria. OneConsult GmbH offers cutting-edge, high-quality and product-independent consulting services, focusing on technical security audits, conceptual audits and digital forensics. Hundreds of organizations in Europe and overseas, including Fortune Global 500 corporations, trust our services. http://www.oneconsult.com
Oracle_logo.gif        Oracle With more than 380,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries around the globe, Oracle offers an optimized and fully integrated stack of business hardware and software systems that helps organizations overcome complexity and unleash innovation. Oracle engineers hardware and software to work together in the cloud and in your data center–from servers and storage, to database and middleware, through applications. Security is a key priority at Oracle. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. http://www.oracle.com/us/support/assurance/index.html
PARASOF_Logo.gif        For 25 years, Parasoft has researched and developed software solutions that help organizations deliver defect-free software efficiently. By integrating Development Testing, API/cloud/SOA/composite app testing, and service virtualization, we reduce the time, effort, and cost of delivering secure, reliable, and compliant software. Parasoft's enterprise and embedded development solutions are the industry's most comprehensive—including static analysis, unit testing with requirements traceability, functional & load testing, dev/test environment management, and more. The majority of Fortune 500 companies rely on Parasoft in order to produce top-quality software consistently and efficiently. http://www.parasoft.com
PI_LinearLogo.png        We believe secure professional and personal identities underlie human progress in a connected world. Our purpose is to enable and protect identity, defend privacy and secure the Internet. Our identity and access management platform gives enterprise customers and employees one-click access to any application from any device. Over 900 companies, including 45 of the Fortune 100, rely on our award-winning products to make the digital world a better experience for hundreds of millions of people. https://www.pingidentity.com
Protiviti.jpg        Protiviti is a global business consulting and risk consulting firm composed of experts specializing in risk, advisory and transaction services. The firm helps solve problems in finance and transactions, operations, technology, information security & privacy, litigation, governance, risk, and compliance. Protiviti's highly trained, results-oriented professionals provide a unique perspective on a wide range of critical business issues for clients in the Americas, Asia-Pacific, Europe and the Middle East. Protiviti has more than 70 locations worldwide and is a wholly owned subsidiary of Robert Half International Inc. (NYSE: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. For additional information about Protiviti, Contact Rocco Grillo at [email protected] / 212.603.8381 http://www.protiviti.com
PWC_log_resized.png        As part of the PwC Advisory services, the department Technology Consulting, from which we will mainly invoke experts, is to be found. This department contains professionals who are specialised in management or business advice related to the introduction and use of information technology. The services of Technology Consulting are set up in order to assist our clients in each of the critical and supporting phases during the implementation path. Our service offerings are structured into 3 different domains, manage, transform and secure. Manage Technology: Following questions are handled in Manage Technology: outsourcing, business continuity, Service Level Agreements (SLAs), Service Management strategy, design & implementation, whether or not the IT architecture is future-proof, (re)design of enterprise wide systems, how to orientate IT as a service organization, etc. Transform through Technology: Most of the projects in Transform through Technology consist of preparing / drafting business cases, support / guidance in project planning & project management, managing external IT services, change management in large IT projects, improving data quality, organizing data migration, support in request for proposals and tenders, user security and authorization set up, documentation creation, etc. This expertise focuses on helping companies during technology transformation projects where technology has an important (controlling) role. Secure Technology: All kinds of assignments related to the privacy legislation, ISO2700x certification, security against hackers, security architecture, secure software, etc. We have substantial experience in securing major financial and other systems, i.e. electronic voting, electronic payment, Digitach, e-ID, mobile, etc. http://www.pwc.be/en/technology-consulting/index.jhtml
Qualys_Logo.gif        Qualys, Inc. is the pioneer and leading provider of information security and compliance cloud solutions with 5,500+ customers in 85 countries, including 51 of the Forbes Global 100. The QualysGuard Cloud Platform and integrated suite of applications helps businesses simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA). http://www.qualys.com
Quotium_with_Seeker_Logo.png        Quotium Technologies is an Interactive Application Security Testing Interactive Application Security Testing</a> technology pioneer with the release of its innovative software Seeker®. Seeker's technology increases the accuracy of vulnerability assessment by combining the detection of a potential vulnerability with verification through a real-time exploit attempt. Seeker dynamically analyzes the application's source code as it runs and its interaction with data across all the application. The result is the identification of complex vulnerabilities and logical flaws not detectable with any other technology. Seeker's “What You See is What You Need to Fix” approach, ranks vulnerabilities by their impacts on data and provides users with focused information to fix the security flaws, including vulnerable lines of code and a video demonstrating the actual attack on the tested application. Seeker can be used without any knowledge of security; it delivers immediate results and integrates in any existing processes. Quotium Technologies as been recognized in 2011 as a Cool vendor by Gartner in Infrastructure Protection and has won several awards in the security field since then. Quotium's products answer the needs of enterprise customers, with over 200 active references. The company is strongly oriented towards innovation with 50% of its staffing allocated to R&D. For more information about Quotium and Seeker visit our website http://www.quotium.com http://www.quotium.com
Rakuten-Global-150x45_72dpi.JPG        http://www.rakuten.com
Ranorex Logo.pdf       Ranorex is a software development company that provides innovative software testing solutions to thousands of companies and education institutions around the world. Ranorex offers a comprehensive range of test automation tools for developing and managing the testing of any desktop, web or mobile application. Ranorex is dedicated to fundamentally improving the quality of software. The Ranorex test automation tools allow both testers and developers to thoroughly test applications from a user´s perspective, making bugs easier to identify and eliminate. Ranorex is cost effective – it’s based on standard programming techniques and common languages such as C# and VB.NET. The tools allow test automation for a variety of environments, devices and applications. Currently supported technologies include .NET, Winforms, WPF, Java, SAP, HTML5, Flash, Flex, Silverlight, iOS, Android, Windows Mobile (native/hybrid) and many more. Out of the box robust test automation based on Ranorex´s market leading GUI object recognition, script-free testing for non-programmers, seamless integration into existing environments and click & go test reports are a few of Ranorex´s features. Due to its ease of use, increased testing accuracy and low cost per seat, Ranorex is an excellent choice for software development teams of virtually any size or level of sophistication. http://www.ranorex.com
Riverbed_Logo.png        Riverbed Technology delivers application performance for the globally connected enterprise. With Riverbed, enterprises can successfully and intelligently implement strategic initiatives such as virtualization, consolidation, cloud computing, and disaster recovery without fear of compromising performance. By giving enterprises the platform they need to understand, optimize and consolidate their IT, Riverbed helps enterprises to build a fast, fluid and dynamic IT architecture that aligns with the business needs of the organization. Additional information about Riverbed (RVBD) is available at www.riverbed.com. http://www.riverbed.com
Sys_scsk_logo_banner_3.jpg        Japan-based global IT service company, SCSK supplies the whole range of IT solutions, system integration to IT infrastructure implementation, IT management, BPO, IT hardware and software sales.Particularly in security field, SCSK offers full-line Web security solution which is prompt and accurate provision against up-to-date cyber attack with a service brand, “SECURE YOUR SITE ™”. On a mission to contribute to enterprises’ business, SCSK assures the safety of IT system with security-oriented consulting, system design, application development, security system implementation, operation and monitoring. SCSK SOC and CSIRT team strongly support enterprises’ stability on a 24/7 basis. http://www.scs.co.jp/sys/
Security_Innovation_Logo_150x41.jpg        Security Innovation focuses on the most difficult problem of IT security, and the root cause of most data breaches – insecure software applications. For more than a decade, we have helped organizations like Microsoft, ING, GoDaddy.com, Progress Energy, Nike and others build internal expertise, uncover critical vulnerabilities, and integrate security into their software development lifecycle (SDLC). The company's Application Security Risk solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development and deployment: Standards, Education, and Assessment. Standards drive the need for education and continued assessments; Education ensures standards and assessments are applied correctly; and, Assessment results drive standards, education and improved tools usage. We deliver these solutions via our TeamMentor product, “out of the box” secure development best practices; our TeamProfessor product, over 100 hours of computer-based training; and our Professional Services which assess software applications & SDLC against industry standards. http://www.securityinnovation.com
SMT Logo 150x45.jpg       SMARTRAC is the leading developer, manufacturer and supplier of RFID and NFC transponders, tags and inlays. The company produces both ready-made and customized solutions used in access control, animal identification, automated fare collection, border control, RFID-based car immobilizers, contactless payment cards, electronic product identification, industry, libraries and media management, laundry, logistics, mobile and smart media, public transport, retail, and many more. SMARTRAC has its registered headquarters in Amsterdam, The Netherlands. The company maintains a global research and development, production and sales network. For more information, visit www.smartrac-group.com and follow us on Twitter: www.twitter.com/SMARTRAC_NV http://www.smartrac-group.com
Sonatype_Logo_Resized.png        Sonatype secures modern software development by fixing at-risk applications, automating policy throughout the lifecycle and identifying hidden risks in your applications. Sonatype's Component Lifecycle Management identifies and tracks OSS components, automates and enforces policy, and prevents the use of flawed components throughout the software lifecycle. Ask about free risk assessments. http://www.sonatype.com
SWAMP_Logo.png        http://continuousassurance.org
TM_Logo_150x45px.jpg        Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25 years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today’s organizations, information has become the most strategic asset; embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need smart protection of information, with technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Trend Micro solutions enable a smart protection strategy for organizations. Smart. Simple. Security that fits.Trend Micro provides layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe. For additional information, visit www.trendmicro.com http://www.trendmicro.com
Trustwave_logo_RGB_-Resized_%281%29.jpg        With insight into the latest vulnerabilities, attack vectors, exploits, malware and security breaches gathered from our security research, penetration testing and incident response engagements - Trustwave's elite security team, SpiderLabs, understands how attackers think and operate. We apply our deep, specialized knowledge to every customer engagement and implant that intelligence in every one of our security products and services. www.trustwave.com
Twitter-bird-blue-on-white_sized.png        With 400 million Tweets per day and more than 200 million active users, there is something for everyone on Twitter, no matter what you're interested in or where you are in the world. Twitter can be accessed on the web, on smartphones and on the simplest of feature phones. At Twitter, we believe that the open exchange of information can have a positive global impact and are inspired by stories of people using Twitter to improve the world in unexpected ways. Twitter is one of the top 5 most visited sites in the world, and we're tackling unique challenges at scale while keeping our users safe. https://www.twitter.com
UIE_Evolution_Logo.png        UIEvolution is the leading mobile solutions provider for Fortune 1000 companies. We help companies take full advantage of connected screens by extending their brands, delivering their unique business objectives, and ensuring that the devices that create the mobile lifestyles of their customers are joined in a continuous thread - smartphones, tablets, smart TVs, and automotive applications. UIEvolution combines world-class consultative services and deep industry knowledge with the proven UIEngine & Evolution Platform. Headquartered in Seattle with offices in Tokyo and Honolulu, UIEvolution has a 13-year track record with clients like Toyota, AT&T, Microsoft, Disney, Princess Cruises, Samsung, Clarion, Mitsubishi, and NTT. http://www.uievolution.com
UPS.jpg        UPS (NYSE: UPS) is a global leader in logistics, offering a broad range of solutions including the transportation of packages and freight; the facilitation of international trade, and the deployment of advanced technology to more efficiently manage the world of business. Headquartered in Atlanta, UPS serves more than 220 countries and territories worldwide. The company can be found on the Web at UPS.com and its corporate blog can be found at blog.ups.com. To get UPS news direct, visit pressroom.ups.com/RSS. Technology: UPS employs nearly 4,300 information technology professionals and supports UPS.com which averages around 27 million page views with 39.5 million packages tracked daily. More UPS technology facts may be found on www.ups.com under About UPS, UPS Facts and UPS Jobs. https://www.ups.com
VeraCode_Resized.png        Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog. https://www.veracode.com
Whitehat.gif        WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks. https://www.whitehatsec.com