← Older revision
Revision as of 15:16, 10 September 2013
Line 40:
Line 40:
|-
|-
| {{MemberLinks|link=http://www.cloudpassage.com|logo=Cloud_Passage_Logo.png}} ||CloudPassage is the leading provider of public and private cloud infrastructure security and creator of Halo®, the industry's first security and compliance automation platform purpose-built for elastic cloud environments. Industry-leading companies like RightScale, MuleSoft, Taulia, Bandwidth.com, and Martini Media trust Halo to seamlessly automate infrastructure security and compliance with standards like PCI, FFIEC, and HIPAA. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital, Shasta Ventures, and other leading investors. For more information, please visit http://www.cloudpassage.com. || http://www.cloudpassage.com
| {{MemberLinks|link=http://www.cloudpassage.com|logo=Cloud_Passage_Logo.png}} ||CloudPassage is the leading provider of public and private cloud infrastructure security and creator of Halo®, the industry's first security and compliance automation platform purpose-built for elastic cloud environments. Industry-leading companies like RightScale, MuleSoft, Taulia, Bandwidth.com, and Martini Media trust Halo to seamlessly automate infrastructure security and compliance with standards like PCI, FFIEC, and HIPAA. Headquartered in San Francisco, Calif., CloudPassage is backed by Benchmark Capital, Tenaya Capital, Shasta Ventures, and other leading investors. For more information, please visit http://www.cloudpassage.com. || http://www.cloudpassage.com
−
|-
−
| {{MemberLinks|link=http://www.coresecurity.com|logo=Core_TM_wtag.png}} ||The Power of Thinking Ahead As the leading provider of predictive security intelligence solutions, CORE Security answers the call of organizations demanding a proactive approach to eliminating business risk. Our solutions empower customers to think ahead, take control of their security infrastructure, and predict and prevent IT security threats. Organizations have to predict security threats – not just react to them Today, the majority of security spending is focused on solutions that take defensive or reactive approaches to threats. As a result, security teams are saddled with overwhelming amounts of disparate security data, tools that don’t communicate, and alerts that sound only after the damage has been done. Organizations that seek to survive and thrive must go on the offensive and predict and preempt threats before it’s too late. We empower organizations to preempt business risk At CORE Security, we believe the greatest risk organizations can take is to remain reactive to IT security threats. We therefore enable our customers to proactively identify critical threats and reveal risk in the context of specific business objectives, operational processes, and regulatory mandates. As a result, security teams not only predict threats but also more effectively communicate their implications to peers in the line of business. CORE Security Solutions CORE Insight Enterprise: Enterprise-class predictive security intelligence platform Business risk identification, validation and prioritization, Continuous threat simulation,Proactive threat replication. CORE IMPACT Professional: Comprehensive vulnerability assessment and testing software Real-world, exploit-based security testing, Network, web, client-side, wireless & mobile coverage CORE WebVerify: Web application testing software Automated testing of custom web sites and applications, Proactive identification of OWASP Top 10 threats CORE CloudInspect: Security testing SaaS for Amazon AWS cloud deployments- Affordable, on-demand cloud security assessment, No prior Amazon authorization required CORE Services- Security consulting services, Product implementation services, Onsite and online training, Customer support (24/7 available) CORE Security Benefits Align with corporate goals Protect brand, reputation and valuation, Retain customers and avoid fines / penalties. Align with performance objectives· Prevent system downtime, Mitigate risks to intellectual property and customer data. Comply with policies and regulations - Address PCI, FISMA/NIST, HIPAA, SOX, GLBA, etc. Increase efficiency and effectiveness - Increase security assessment scope and frequency, Optimize headcount and consulting resources. Practice process excellence- Conduct documented, repeatable security assessments, Validate security using established best practices. CORE Security helps more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate related risk to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company’s innovative security research center. || www.coresecurity.com.
|-
|-
| {{MemberLinks|link=http://www.coverity.com|logo=Coverity_Logo.png}} ||Coverity, Inc., the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use the Coverity Development Testing Platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco. Follow us on [https://twitter.com/coverity Twitter] or check out our [https://communities.coverity.com/blogs/development-testing-blog blog]. || http://www.coverity.com/
| {{MemberLinks|link=http://www.coverity.com|logo=Coverity_Logo.png}} ||Coverity, Inc., the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use the Coverity Development Testing Platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco. Follow us on [https://twitter.com/coverity Twitter] or check out our [https://communities.coverity.com/blogs/development-testing-blog blog]. || http://www.coverity.com/
Line 48:
Line 46:
|-
|-
| {{MemberLinks|link=http://www.denimgroup.com|logo=Denim_Group_Logo.gif}} ||Denim Group is a custom software development firm skilled in large-scale development projects across multiple platforms, languages and applications. What makes Denim Group unique is that the company brings significant core competencies in software security to the table, offering an innovative blend of secure software development, testing and training capabilities that protect a company’s biggest asset, its data. Denim Group customers span an international client base of commercial and public sector organizations across the financial services, banking, insurance, healthcare and defense industries. Its depth of experience building large-scale software development systems in a secure fashion has made the company's leaders recognized experts in their fields. Denim Group has been recognized as one of the 5,000 Fastest Growing Company's by Inc. Magazine several years in a row, and has won multiple awards including its recent accolades as one of the best places to work in San Antonio.||www.denimgroup.com
| {{MemberLinks|link=http://www.denimgroup.com|logo=Denim_Group_Logo.gif}} ||Denim Group is a custom software development firm skilled in large-scale development projects across multiple platforms, languages and applications. What makes Denim Group unique is that the company brings significant core competencies in software security to the table, offering an innovative blend of secure software development, testing and training capabilities that protect a company’s biggest asset, its data. Denim Group customers span an international client base of commercial and public sector organizations across the financial services, banking, insurance, healthcare and defense industries. Its depth of experience building large-scale software development systems in a secure fashion has made the company's leaders recognized experts in their fields. Denim Group has been recognized as one of the 5,000 Fastest Growing Company's by Inc. Magazine several years in a row, and has won multiple awards including its recent accolades as one of the best places to work in San Antonio.||www.denimgroup.com
−
|-
−
| {{MemberLinks|link=http://www.ddifrontline.com|logo=DDI Logo 150x45.GIF}} ||Founded in 1999, Digital Defense, Inc. (DDI) is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and Decisive Security Intelligence. This proven method bolsters the capability of organizations to reduce risk and keep information, intellectual property and reputations secure. The combination of DDI’s certified Security Analysts, patent-pending scanning technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers the most powerful assessment results and remediation management solutions possible. ||www.ddifrontline.com
|-
|-
| {{MemberLinks|link=http://www.elearnsecurity.com|logo=ELearnSecurity_owasp_150-45.png}} ||Based in Pisa, Italy, eLearnSecurity is a leading provider of IT security and penetration testing courses for IT professionals. eLearnSecurity's mission is to advance the career of IT security professionals by providing affordable and comprehensive education. All eLearnSecurity courses utilize engaging eLearning and the most effective mix of theory, practice and methodology in IT security - all with real-world lessons that students can immediately apply to build relevant skills and keep their organization's data and systems safe. eLearnSecurity has proven to be a leading innovator in the field of practical security training. Best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework, Hack.me and Hera Network Security Lab, has changed the way students learn and practice new skills. Twitter handle: @elearnsecurity ||http://www.elearnsecurity.com
| {{MemberLinks|link=http://www.elearnsecurity.com|logo=ELearnSecurity_owasp_150-45.png}} ||Based in Pisa, Italy, eLearnSecurity is a leading provider of IT security and penetration testing courses for IT professionals. eLearnSecurity's mission is to advance the career of IT security professionals by providing affordable and comprehensive education. All eLearnSecurity courses utilize engaging eLearning and the most effective mix of theory, practice and methodology in IT security - all with real-world lessons that students can immediately apply to build relevant skills and keep their organization's data and systems safe. eLearnSecurity has proven to be a leading innovator in the field of practical security training. Best of breed virtualization technology, in-house projects such as Coliseum Web Application Security Framework, Hack.me and Hera Network Security Lab, has changed the way students learn and practice new skills. Twitter handle: @elearnsecurity ||http://www.elearnsecurity.com
Line 86:
Line 82:
|-
|-
| {{MemberLinks|link=http://www.nokia.com|logo=Nokia.jpg}} || ||www.nokia.com
| {{MemberLinks|link=http://www.nokia.com|logo=Nokia.jpg}} || ||www.nokia.com
−
|-
−
| {{MemberLinks|link=http://www.ntobjectives.com|logo=NT_Objectibves_Logo_Resized.png}} ||NT OBJECTives (NTO) provides highly automated, comprehensive and accurate web application security software, services and SaaS. By dedicating more than 10 years to solving the most difficult application security challenges through automation, NTO’s software, SaaS and services solutions enable organizations to maximize both efficiency and effectiveness of their web application security programs. NTO customers appreciate NTO’s dedication, rapid response and personal service. NT OBJECTIVES is privately held with headquarters in Irvine, CA. Follow us on Twitter @ntobjectives. ||www.ntobjectives.com
|-
|-
| {{MemberLinks|link=http://www.oracle.com/us/support/assurance/index.html|logo=Oracle_logo.gif}} ||Oracle With more than 380,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries around the globe, Oracle offers an optimized and fully integrated stack of business hardware and software systems that helps organizations overcome complexity and unleash innovation. Oracle engineers hardware and software to work together in the cloud and in your data center–from servers and storage, to database and middleware, through applications. Security is a key priority at Oracle. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. || www.oracle.com
| {{MemberLinks|link=http://www.oracle.com/us/support/assurance/index.html|logo=Oracle_logo.gif}} ||Oracle With more than 380,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries around the globe, Oracle offers an optimized and fully integrated stack of business hardware and software systems that helps organizations overcome complexity and unleash innovation. Oracle engineers hardware and software to work together in the cloud and in your data center–from servers and storage, to database and middleware, through applications. Security is a key priority at Oracle. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. || www.oracle.com
Line 124:
Line 118:
|-
|-
| {{MemberLinks|link=https://www.veracode.com|logo=VeraCode_Resized.png}} ||Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog. ||www.veracode.com
| {{MemberLinks|link=https://www.veracode.com|logo=VeraCode_Resized.png}} ||Veracode is the only independent provider of cloud-based application intelligence and security verification services. The Veracode platform provides the fastest, most comprehensive solution to improve the security of internally developed, purchased or outsourced software applications and third-party components. By combining patented static, dynamic and manual testing, extensive eLearning capabilities, and advanced application analytics, Veracode enables scalable, policy-driven application risk management programs that help identify and eradicate numerous vulnerabilities by leveraging best-in-class technologies from vulnerability scanning to penetration testing and static code analysis. Veracode delivers unbiased proof of application security to stakeholders across the software supply chain while supporting independent audit and compliance requirements for all applications no matter how they are deployed, via the web, mobile or in the cloud. Veracode works with customers in more than 80 countries worldwide representing Global 2000 brands. For more information, visit www.veracode.com, follow on Twitter: @Veracode or read the Veracode Blog. ||www.veracode.com
−
|-
−
| {{MemberLinks|link=http://www.visiblerisk.com/|logo=Visible_Risk_Logo_Resized.jpg}} ||VisibleRisk integrates with your security operations to identify any interesting or suspicious activity within your network. Our goal is to hunt and identify suspicious or malicious activity within your network to help you protect your enterprise and investments. Our expertise allows for maximum flexibility within your unique environment to effectively identify any adversaries that exist in your environment. || www.visiblerisk.com
|-
|-
| {{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}} ||WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks. ||www.whitehatsec.com
| {{MemberLinks|link=https://www.whitehatsec.com/|logo=Whitehat.gif}} ||WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s flagship product family, is the most accurate and cost-effective website vulnerability management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks. ||www.whitehatsec.com