Black Hat USA 2011 //Executive Briefing Sponsors
Caesars Palace Las Vegas, NV • August 2
Premium Sponsor:
Qualys, Inc. is the leading provider of Software-as-a-Service (SaaS) IT security risk and compliance management solutions – delivered as a service. Qualys solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures.
The QualysGuard® service is used today by more than 5,000 organizations in 85 countries, including 47 of the Fortune Global 100, and performs more than 500 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company, and has been recognized by leading industry analysts for its market leadership. Qualys was named Best Security Company in the 2011 SC Awards U.S.
Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS. Qualys is a founding member of the Cloud Security Alliance (CSA).
For more information, please visit: www.qualys.com
** Dinner Co-Sponsor
Foundation Sponsor:
Bit9 provides Advanced Endpoint Protection and Server Security using the market-leading adaptive application whitelisting technology.
The company's award-winning products provide total visibility and control over all software on endpoints, eliminating the risk caused by malicious, illegal and unauthorized software. Bit9 specializes in protecting organizations against Advanced Persistent Threats.
Bit9 leverages the Bit9 Global Software Registry™ -- the world's largest database of software intelligence -- to identify and classify software, delivering the highest levels of endpoint security, compliance, and manageability. The company's global customers come from a wide variety of industries, such as government, financial services, retail, healthcare, e-commerce and education.
Tom Murphy has served as Bit9's CSO since 2006 and was named CxO of the year in 2007 by the Massachusetts Technology Leadership Council. Murphy leverages 15 years of IT expertise and senior leadership experience at 8 software companies to lead Bit9's Marketing and strategic direction. Murphy comes to Bit9 from Symantec/Relicore where he was Vice President of Marketing. Prior to Symantec, Murphy was at Veritas Software/Precise Software Solutions where he established leadership in the Application Performance Management market culminating with a highly successful IPO. He has also held senior product management and global marketing positions with BMC Software/BGS Systems. Mr. Murphy holds a master of science degree in Computer Information Systems from Northeastern University. He also holds a bachelor of science degree with a double major in Computer Science and Mathematics from Westfield State University.
Harry Sverdlove, Bit9's Chief Technology Officer, draws from nearly two decades of application design and analysis with industry-leading IT enterprises, adding a new layer of technical expertise and strategic vision to Bit9's portfolio of endpoint security solutions. Most recently, Sverdlove served as Principal Research Scientist for McAfee, Inc., where he supervised the overall architecture of crawlers, spam detectors and link analyzers. Sverdlove joined McAfee through its 2006 acquisition of SiteAdvisor Inc., where he worked as Chief Scientist to develop systems for testing, detecting and analyzing any Windows-based application. Prior to joining SiteAdvisor, Harry ran his own consulting company specializing in Windows automation and spam detection. Before that he was Director of Engineering at Compuware Corporation (formerly NuMega Technologies). Prior to NuMega, Harry was Principal Architect for Rational Software, where he designed the core automation engine behind Rational Robot. Harry has a bachelor's degree in electrical engineering from MIT.
Dinner Co-Sponsor:
Core Security Technologies provides organizations with real-world security intelligence. In today's highly secured organizations, there is no shortage of available security data, but there is a shortage of security intelligence. Core's security test and measurement solutions fill the gap between the mass of security data and the intelligence to constantly know where the real exposures reside. Core's customers gain real intelligence and visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations and manage IT risks.
Core Security's software solutions are used by more than a thousand commercial and government organizations. Solutions range from desktop software tools for technical security experts to infrastructure-wide automated testing and measurement platforms and services that leverage over a decade of trusted research and leading-edge threat expertise from the company's Security Consulting Services, CoreLabs and Engineering groups. Core Security Technologies can be reached at +1 (617) 399-6980 or on the Web at: http://www.coresecurity.com.
Event Sponsors:
The company's award-winning products provide total visibility and control over all software on endpoints, eliminating the risk caused by malicious, illegal and unauthorized software. Bit9 specializes in protecting organizations against Advanced Persistent Threats.
Bit9 leverages the Bit9 Global Software Registry™ -- the world's largest database of software intelligence -- to identify and classify software, delivering the highest levels of endpoint security, compliance, and manageability. The company's global customers come from a wide variety of industries, such as government, financial services, retail, healthcare, e-commerce and education. For more info, visit: www.Bit9.com
IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure, empowering clients to innovate and operate their businesses on the most secure infrastructure platforms. Through world-class solutions that address risk across the enterprise, IBM helps organizations build a strong security posture that helps reduce costs, improve service, and manage risk. IBM X-Force(R) Research and Development is one of the most renowned commercial security research and development groups in the world. The combined power of IBM security research and monitoring includes more than 7 billion security related events daily, more than 48 thousand vulnerabilities tracked in the X-Force database, 15 thousand security experts, and more than 3 thousand security and risk management patents. According to a recent IBM X-Force report, 49% of vulnerabilities are Web application vulnerabilities. For more information on how to address today's biggest risks and to see a demonstration of IBM Rational AppScan, AppScan Source Edition and IBM Security Network Intrusion Prevention System (IPS) please visit us at ibm.com/security.
Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase® platform provides the foundation for government, corporate and law enforcement organizations to respond to eDiscovery requests; conduct internal investigations; respond to regulatory inquiries or perform data and compliance auditing; and defend the network and secure sensitive data. There are more than 30,000 licensed users of the EnCase technology worldwide, and thousands attend Guidance Software's renowned training programs annually. For more information, visit: www.guidancesoftware.com
Radware (NASDAQ:RDWR), a global leader in integrated application delivery and network security solutions, assures the full availability, maximum performance, and complete security of business-critical applications for nearly 10,000 enterprises and carriers worldwide. Radware's family of cutting-edge security solutions provide integrated application and network security technologies to enhance best of breed, multi-layered security architectures.
The full suite of award-winning attack mitigation technologies include: intrusion prevention, web application firewall, DoS protection, network behavioral analysis, and reputation preservation capabilities. These are integrated into one solution – DefensePro® – for ease of deployment and cost-effectiveness. These technologies are complemented by an advanced SEIM management and forensics system (APSolute Vision™) and professional security services. Radware's Emergency Response Team (ERT) provides 24*7, on-site support for customers facing immediate attack. In addition, Radware' security operations center (SOC) provides necessary ongoing updates for emergency signature creation; emerging threat mitigation, detection and updates; and custom signature development. Both the ERT and SOC have been industry recognized for providing first and necessary safeguards against: WikiLeaks Operation Payback; South Korean DDoS attacks; and iPhone, Oracle, Italian Job and Windows vulnerabilities.
Radware also provides a custom Managed Security Service Provider (MSSP) solution for target customers in need. With this complete suite of products, services, and tailored offerings, Radware is optimally suited to meet your current and emerging security needs.
For more information on how Radware can take your security operations to the next level, please visit www.radware.com or contact us at info@radware.com.
Research In Motion Limited is a leading designer, manufacturer, and marketer of innovative wireless solutions for the worldwide mobile communications market. Through the development of integrated hardware, software, and services that support multiple wireless network standards, RIM provides platforms and solutions for seamless access to time-sensitive information including email, phone, SMS messaging, Internet and intranet-based applications. RIM technology also enables a broad array of third-party developers and manufacturers to enhance their products and services with wireless connectivity to data. RIM's portfolio of award-winning products, services, and embedded technologies are used by thousands of organizations around the world and include the BlackBerry® wireless platform, the RIM Wireless Handheld™ product line, software development tools, radio-modems, and software/hardware licensing agreements. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe, and Asia Pacific. For more information, visit: www.rim.com or www.blackberry.com.