Black Hat USA 2010 //sponsors
Caesars Palace Las Vegas, NV • July 24-29
Diamond Sponsor:
Qualys, Inc. is the leading provider of on demand IT security risk and compliance management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures.
The QualysGuard® service is used today by more than 4,000 organizations in 85 countries, including 42 of the Fortune Global 100 and performs more than 500 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company.
Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, NTT, SecureWorks, Symantec, Tata Communications and TELUS.
For more information, please visit: www.qualys.com
Platinum Sponsors:
Adobe revolutionizes how the world engages with ideas and information. For more than two decades, the company's award-winning software and technologies have set new standards for producing and delivering content that engages people virtually anywhere at anytime. From rich images in print, video, and film to dynamic digital content across multiple media, the impact of Adobe solutions is evident across industries and felt by anyone who creates, views, and interacts with information. With a reputation for excellence and a portfolio of many of the most respected software brands, Adobe is one of the world's largest and most diversified software companies. For more info, visit: www.adobe.com
Cisco security balances protection and power to deliver highly secure collaboration. With Cisco security, customers can connect, communicate, and conduct business securely while protecting users, information, applications, and the network. Cisco pervasive security can help minimize security and compliance IT risk, reduce IT administrative burden, and lower TCO. For more info, visit: www.cisco.com
Microsoft is proud to be a continuing sponsor of the Black Hat Security conference. We appreciate Black Hat providing a unique forum in which security researchers from all over the world, IT Pros and industry luminaries can gather to share insights, knowledge and information to advance security research.
Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem, Microsoft is also dedicated to software security and privacy.
Since the onset of Trustworthy Computing we have fostered a culture of security within Microsoft that includes developing secure code, building strong relationships with industry researchers and partners, and providing guidance to help protect customers. We would like to thank all of the customers, partners and security researchers who have worked with us to advance the state of the art in security science. Only by working together with partners, researchers and the community can we all ensure the advancement and success of the technology industry.
NitroSecurity develops security information and compliance management solutions that protect business information and infrastructure. NitroSecurity solutions reduce business risk exposure and increase network and information availability by removing the scalability and performance limitations of security information management. Utilizing the industry's fastest analytical tools, NitroSecurity identifies correlates and remediates threats in minutes instead of hours, allowing organizations to quickly mitigate risks to the organization's information and infrastructure. NitroSecurity serves more than 500 enterprises across many vertical markets, including healthcare, education, financial services, government, retail, hospitality and managed services. For more information, please visit: www.nitrosecurity.com
Rapid7 is the leading provider of unified vulnerability management, compliance, and penetration testing solutions, delivering actionable intelligence about an organization’s entire IT environment. Rapid7 offers the only integrated threat management solution that enables organizations to implement and maintain best practices and optimize their network security, Web application security and database security strategies.
Recognized as the fastest growing vulnerability management company in the U.S. by Inc. Magazine, Rapid7 helps leading organizations such as Liz Claiborne, Southern Company, the United States Postal Service, the New York Times, Carnegie Mellon University and the National Nuclear Security Administration (NNSA) to mitigate risk and maintain compliance for regulations such as PCI, HIPAA, FISMA, SOX and NERC . Rapid7 also manages the Metasploit Project, the leading open-source penetration testing platform with the world’s largest database of public, tested exploits.
For more information, visit: www.rapid7.com
RSA, The Security Division of EMC, is the premier provider of security solutions for business acceleration, helping the world's leading organizations succeed by solving their most complex and sensitive security challenges. RSA's information-centric approach to security guards the integrity and confidentiality of information throughout its lifecycle - no matter where it moves, who accesses it or how it is used.
RSA offers industry-leading solutions in identity assurance & access control, data loss prevention, encryption & key management, compliance & security information management and fraud protection. These solutions bring trust to millions of user identities, the transactions that they perform, and the data that is generated. For more information, please visit: www.RSA.com and www.EMC.com
Gold Sponsors:
Core Security Technologies is the leader in commercial-grade penetration testing software solutions that IT executives rely on to expose vulnerabilities, measure operational risk, and assure security effectiveness. The company’s CORE IMPACT product family offers a comprehensive approach to assessing the security of network systems, endpoint systems, email users, web applications and wireless networks against complex threats.
Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specializations in smart grid technologies, software assurance, and compliance. Headquartered in Seattle, WA, with locations around the world, IOActive works with a majority of Global 500 companies including power and utility, hardware, retail, financial, media, router, aerospace, high-tech, and software development organizations. As a home for highly skilled and experienced professionals, IOActive attracts the likes of Dan Kaminsky, Ilja van Sprundel, Mike Davis, Tiller Beauchamp, Ward Spangenberg, and Wes Brown—talented consultants who contribute to the growing body of security knowledge by speaking at such elite conferences as Black Hat, Ruxcon, Defcon, Shakacon, BlueHat, CanSec, and WhatTheHack.
With the majority of IOActive’s customers ranked in the top 30% of the Fortune 500, IOActive is positioned and well experienced to handle a variety of security needs. IOActive has:
- Worked on IT disaster recovery and business continuity planning for major insurance companies, state organizations, and energy companies
- Developed and delivered secure application development programs based upon OWASP's top ten vulnerabilities, and application and network threat modeling methodologies to major software and telecommunication companies
- Helped various Fortune 500 organizations with services ranging from enterprise risk management to independent technical validations of security hardware and a wide range of applications
Through its technology platform, Norman delivers core antimalware protection for clients, servers and network security. These products and services are designed to protect business communications and resources, including corporate networks and applications, remote employees, branch offices, and extranets. The company also offers market-leading advanced malware analyzers which enable organizations to automate the process of analyzing suspicious files, identifying types of malware, and assessing threats. Norman's award-winning security solutions protect millions of consumer PCs from hackers, spyware and identity theft. For more information, please visit www.norman.com
Silver Sponsors:
Accuvant is the only research-driven information security partner delivering alignment between IT security and business objectives, clarity to complex security challenges and confidence in enterprise security decisions.
Accuvant delivers these solutions through three practice areas: Risk and Compliance Management, Accuvant LABS and Technology Solutions. Based on our clients’ unique requirements, Accuvant assesses, architects and implements the policies, procedures and technologies that most efficiently and effectively protect valuable data assets.
Since 2002, more than 2,500 organizations, including 35 of the Fortune 100, have trusted Accuvant with their data security challenges. Headquartered in Denver, Accuvant has offices in 28 cities across the United States. For more information, please visit www.accuvant.com, follow us on Twitter: @accuvant, or keep in touch via Facebook: http://tiny.cc/facebook553.
Amazon.com, a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and offers Earth's Biggest Selection, where customers can find and discover anything they might want to buy online. The brightest minds come to Amazon to develop technology that improves the lives of shoppers and sellers around the world. Pioneering technical challenges of unprecedented scale and complexity, Amazon also provides developers access to Amazon’s own back-end platform and in-the-cloud infrastructure. Examples include Amazon Elastic Compute Cloud, Amazon Simple Storage Service, Amazon SimpleDB, Amazon Simple Queue Service, Amazon Flexible Payments Service, and Amazon Mechanical Turk. For more info, visit: www.amazon.com
ArcSight (NASDAQ:ARST) is a leading global provider of compliance and security management solutions that protect enterprises and government agencies. ArcSight helps customers comply with corporate and regulatory policy, safeguard their assets and processes, and control risk. The ArcSight platform collects and correlates user activity and event data across the enterprise so that businesses can rapidly identify, prioritize, and respond to compliance violations, policy breaches, cybersecurity attacks, and insider threats. For more information, visit www.arcsight.com.
BigFix enables its customers to manage IT infrastructure through instant-on solutions that discover, assess, change, and enforce security and software configurations on widely distributed endpoint computers in real time. By incorporating BigFix as a core component of a global IT strategy, customers achieve revolutionary gains in system visibility, security, and ability to stay ahead of fast moving developments, while significantly reducing IT service delivery costs.
BigFix manages IT infrastructures via instant-on solutions to discover, assess, change and enforce security & software configurations in real-time on widely distributed computers. Implementing BigFix as a core component of a global IT strategy allows unprecedented visibility, security and significantly reduces IT service delivery costs. For more info, visit: www.bigfix.com
Blue Coat Systems is the technology leader in Application Delivery Networking. Distributed enterprises view the network and business-enabling applications as critical to their success. Unfortunately, they are struggling to keep pace in a rapidly changing business environment which can compromise their competitiveness. Blue Coat offers an Application Delivery Network infrastructure that provides the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere. Unlike competitive offerings, Blue Coat offers unmatched visibility into the performance and security of business applications and web traffic running across the networks of the distributed enterprise, which provides the comprehensive application and user control required to contain costs, enhance business productivity and respond quickly to changing business requirements. Blue Coat has an aggressive strategy and solution roadmap to advance the integration of visibility, acceleration and security technologies at the heart of the Application Delivery Network. Our award winning portfolio consists of best-in-class solutions for Application Performance Monitoring, WAN Optimization, and Secure Web Gateway available through a global service and support organization. Blue Coat is trusted by more than 15,000 customers worldwide, including 81% of the Fortune® Global 500.
www.bluecoat.com/solutions/businessneeds/secureweb
BluePoint Security is a leader in the development of cutting edge antivirus software. Utilizing an innovative cloud based approach, BluePoint delivers what no other competitor can - a real solution to the problem. Whether you're protecting one computer or one million computers, we have the right solution for you. Look no further - total computer security is just a few clicks away!
Breach Security, Inc. is the leading provider of real-time, continuous web application security that protects sensitive web-based information. Breach Security’s products protect web applications from hacking attacks and data leakage, ensure web applications operate as intended and comply with the PCI DSS requirements. The company’s products are trusted by thousands of organizations around the world, including leaders in finance, healthcare, ecommerce, travel, and government. For more info, visit: www.breach.com
Cenzic, a trusted provider of software and SaaS security products, helps organizations secure their websites against hacker attacks. Cenzic focuses on Web Application Security, automating the process of identifying security defects at the Web application level where more than 75 percent of hacker attacks occur. Our dynamic, black box Web application testing is built on a non-signature-based technology that finds more “real” vulnerabilities as well as provides vulnerability management, risk management, and compliance with regulations and industry standards such as PCI.
Cenzic solutions help secure the websites of numerous Fortune 1000 companies, all major security companies, leading government agencies and universities, and hundreds of SMB companies -- overall helping to secure trillions of dollars of e-commerce transactions. The Cenzic solution suite fits the needs of companies across all industries and government agencies, from testing remotely via our managed service (Cenzic ClickToSecure® Managed), to a full enterprise software product (Cenzic Hailstorm® Enterprise ARC™) for managing security risks across the entire company. For more info, visit: www.cenzic.com
FireEye Malware Protection Systems break the full Modern Malware infection lifecycle stopping zero-day attacks and outbound callbacks while inoculating networks from future attacks. FireEye blocks the 90% of Modern Malware that conventional defenses miss and features near-zero false positive rates for a rapid security ROI. FireEye MPS appliances have integrated Malware-VM and Malware-Callback filters to block known attacks, detect zero-day malware, and stop malware transmissions. By conducting malware analysis within advanced virtualization environments, FireEye eliminates the overhead of false positives and tuning associated with conventional defenses.
The FireEye MAX Cloud Intelligence network provide customers global security intelligence to protect their local network. Coupled with in-network MPS appliances that protect the local network, FireEye offers a global malware analysis & exchange cloud to distribute and share FireEye auto-generated security intelligence about Modern Malware and its unauthorized outbound destinations. By sharing out this intelligence to local FireEye appliances, customers worldwide benefit from the latest intelligence on inbound attacks and unauthorized outbound communications to prevent data thefts.
Taking a strategic approach to security, Foreground Security helps organizations align information security with key business objectives. The company was founded by security professionals with over 20 years of experience to provide organizations with cutting-edge information and network security services, designed to significantly refine and improve their protection efforts. Foreground Security enables customers to optimize their network security investments while taking a proactive approach to protecting their most important information assets from potential threats.
Foreground Security offers comprehensive security services that enable Government agencies and commercial organizations to secure critical data, protect identities and demonstrate compliance. The company leverages its experts’ unparalleled insights to provide customers with the strategy and know-how required to develop, implement and maintain on-going secure and compliant policies, infrastructure and training.
Foreground Security performs in-depth technical testing of networks, applications, and various security related infrastructure components such as firewalls, virtual and wireless networks. The company employs experienced professionals who hold CISSP, CCSP, CISM, CEH, CHFI and MCSE certifications and who have conducted Penetration Tests, C&A Projects, and Policy development for well over 100 Government agencies and corporations, making Foreground Security the ideal information security partner.
At Google, we take our Security Philosophy seriously. As a provider of software and services for many users, advertisers and publishers on the Internet, we recognize how important it is to help protect your privacy and security. We understand that secure products are instrumental in maintaining the trust you place in us and strive to create innovative products that both serve your needs and operate in your best interest.
We have learned that when security is done right, it's done as a community. This includes everybody: the people who use Google services, the software developers who make our applications, and the external security enthusiasts who keep us on our toes. These combined efforts go a long way in making the Internet safer and more secure.
For the latest news and insights from Google on security and safety on the Internet, visit our online security blog:
www.googleonlinesecurity.blogspot.com
Guidance Software is recognized worldwide as the industry leader in digital investigative solutions. Its EnCase® platform provides the foundation for government, corporate and law enforcement organizations to respond to eDiscovery requests; conduct internal investigations; respond to regulatory inquiries or perform data and compliance auditing; and defend the network and secure sensitive data. There are more than 30,000 licensed users of the EnCase technology worldwide, and thousands attend Guidance Software's renowned training programs annually. For more information, visit:
HBGary, Inc. was founded in 2004 with a notion that there was a better way to do enterprise detection and analysis of unknown malware. The founder, renown security expert, Greg Hoglund understood that the threats were changing, becoming more sophisticated and focused and that soon, corporations were going to face security issues that they were ill equipped to handle. The United States Air force and Department of Homeland Security shared this view and awarded HBGary several SBIR grants to develop solutions for advanced malware and persistent threats. HBGary provides the ACTIVE INTELLIGENCE that is critical to understanding the intent of the threat, the traits associated with the malware and information that will help make your existing investment in your security infrastructure more valuable. With partners such as McAfee, Guidance Software and Verdasys, we make integrating into your environment seamless.
HP's application security solutions are part of the industry's most comprehensive suite of IT management software, HP's business technology optimization (BTO). HP's BTO software is designed to help IT make every dollar deliver positive business outcomes. HP has paired SPI Dynamics' security expertise with the full range of HP application security products, SaaS and services to help drive lower costs, improve delivery time and reduce risk. Stop by our booth to see the latest versions of HP WebInspect, HP QAInspect and HP Assessment Management Platform.
www.hp.com/go/securitysoftware
IBM Security Solutions include an extensive portfolio of hardware, software solutions, professional and managed services offerings covering the spectrum of IT and business security risks: people and identity, data and information, application and process, network, server and endpoint and physical infrastructure, empowering clients to innovate and operate their businesses on the most secure infrastructure platforms. Through world-class solutions that address risk across the enterprise, IBM helps organizations build a strong security posture that helps reduce costs, improve service, and manage risk. IBM X-Force(R) Research and Development is one of the most renowned commercial security research and development groups in the world. The combined power of IBM security research and monitoring includes more than 7 billion security related events daily, more than 48 thousand vulnerabilities tracked in the X-Force database, 15 thousand security experts, and more than 3 thousand security and risk management patents. According to a recent IBM X-Force report, 49% of vulnerabilities are Web application vulnerabilities. For more information on how to address today’s biggest risks and to see a demonstration of IBM Rational AppScan, AppScan Source Edition and IBM Security Network Intrusion Prevention System (IPS) please visit us at booth #30 or ibm.com/security.
// BOOTH 30
More companies trust Imperva to secure their data than any other vendor. Imperva’s proven solutions deliver activity monitoring, real-time protection and risk management of critical business data and applications.
Imperva solutions overcome many of the security challenges faced by IT organizations by delivering accurate, actionable information on all data access, usage, and business processes within real-world production environments, and without impacting the efficiency of business functions.
The global leader in Application Data Security, Imperva’s award-winning governance and protection solutions provide full visibility and control of enterprise data from the database, through the application, to the accountable end user. For more information, visit: www.imperva.com
LogLogic® is a leader in log management, compliance management and security management solutions designed to improve accountability and lower costs for organizations of all sizes. LogLogic has extended its open log management platform to support applications in compliance management, database security monitoring, and security information and event management.
Lookingglass delivers industry’s first Global Cyber Situational Awareness network intelligence platform, offering a real-time virtual, physical and contextual view of the global Internet extending into the enterprise. Lookingglass’ core product, ScoutVision™, helps emergency responders predict and monitor impacts to the Internet and critical communications infrastructure during cyber attacks or network outages, physical terror attacks, natural disasters, and other destructive catastrophes.
It all started with a few questions:
- "What is the next generation security platform?"
- "How can customers achieve the ‘comprehensive cyber situational awareness’ ideal?"
- "Where does the enterprise boundary end?"
- "How vulnerable is the Internet and each one of us who depends on it?"
The Lookingglass team set out to answer these questions. In the process, Lookingglass developed a solution that will change the way cyber professionals view, analyze and act on Internet activity. ScoutVisionTM offers features delivered in modules unique to Enterprise Security Management, Critical Infrastructure Protection, Cyber Defense, Cyber Intelligence, and Investigative Analysis applications.
ScoutVision™ provides a dynamic view of the world’s enterprise and Internet activity. By fusing data from various proprietary sources and partnerships, ScoutVision™ is the only solution that provides analysis and visualization of logical (IP routing), physical (geo-location) and transit medium (fiber, satellite) topology. Features include:
- Advanced Monitoring and Visualization
- Internet / Enterprise Routing and Infrastructure Analytics
- Malicious Activity and IP Threat Intelligence
- Geo-Selection and Cyber Dashboard
- Collaboration, Alerts, and Warnings
Download our white papers on Network Analysis 2.0 at www.lgscout.com/knowledge-center. Twitter handle: ScoutVision.
McAfee, Inc., headquartered in Santa Clara, California, is the world's largest dedicated security technology company. McAfee is relentlessly committed to tackling the world's toughest security challenges. The company delivers proactive and proven solutions and services that help secure systems and networks around the world, allowing users to safely connect to the Internet, browse and shop the web more securely. Backed by an award-winning research team, McAfee creates innovative products that empower home users, businesses, the public sector and service providers by enabling them to prove compliance with regulations, protect data, prevent disruptions, identify vulnerabilities, and continuously monitor and improve their security.
MITRE, in collaboration with the international information security community, is improving the manageability and measurability of cyber security by enumerating baseline security data, providing standardized languages as means for accurately communicating the information, and encouraging the sharing of that content with users in repositories.
The "Making Security Measurable" initiatives below provide a foundation for facilitating effective security process coordination and enabling automation to assess, manage, and improve the security posture of enterprise security information infrastructures:
Enumerations
- Common Vulnerabilities and Exposures (CVE®)
- Common Weakness Enumeration (CWE™)
- Common Attack Pattern Enumeration and Classification (CAPEC™)
- Common Configuration Enumeration (CCE™)
- Common Platform Enumeration (CPE™)
- CWE/SANS Top 25 Most Dangerous Programming Errors list
Languages
- Open Vulnerability and Assessment Language (OVAL®)
- Common Event Expression (CEE™)
- Malware Attribute Enumeration and Characterization (MAEC™)
- Extensible Configuration Checklist Description Format (XCCDF)
Repositories
- OVAL Repository of Vulnerability, Compliance, Inventory, and Patch Definitions
- U.S. National Vulnerability Database (NVD) based on CVE List
- NIST Security Content Automation Protocol (SCAP) content that leverages CVE, CCE, CPE, and OVAL initiatives
- Red Hat Repository of OVAL Patch Definitions corresponding to Red Hat Errata security advisories
Visit BOOTH 65 to learn how these standards are increasingly being used as the basis of security management and measurement activities by industry, government, and academia from around the world.
MakingSecurityMeasurable.mitre.org
// BOOTH 65
Since it’s inception in 1986, NCP engineering has delivered innovative software that allows enterprises to rethink their secure remote access and overcome the complexities of creating, managing and maintaining network access for staff. NCP’s award winning product line spans the spectrum of remote access, from IPSec / SSL VPN to end-point firewalls and network access control (NAC) functions. The company’s products support organizations with complex remote user needs, who want to leverage the latest end-devices to increase staff productivity, reduce network administration and adapt policy changes on-the-fly. Each solution is interoperable with existing third-party software or hardware. Headquartered in the San Francisco Bay Area, the company serves 10,000-plus customers worldwide throughout the healthcare, financial, education and government markets, as well as many Fortune 500 companies. NCP has established a network of national and regional technology, channel, and OEM partners to serve their customers.
For more information, visit: www.ncp-e.com
NetWitness® Corporation is the world leader in real-time network forensics and automated threat intelligence solutions, helping government and commercial organizations detect, prioritize and remediate complex IT risks. NetWitness is the single security solution that addresses a wide range of needs as diverse as advanced persistent threats, data leakage, malware activity, insider threats, and more. Originally developed for the U.S. Intelligence Community, NetWitness provides enterprises worldwide with breakthrough methods of network content analysis and host-based risk discovery and prioritization. NetWitness customers include Defense, national law enforcement and intelligence agencies, top US and European Banks, and Global 1000 organizations.
Novell offers a compelling set of security management tools. Novell* Sentinel* is an award winning SIEM tool that enables organizations to meet compliance goals and harden their IT environment. Sentinel automates incident identification and resolution based on built-in business rules. With Sentinel*, IT administrators can monitor and track the status of violations and remediation actions, and can quickly identify new trends or attacks across the extended enterprise using virtually any data source.
To simplify compliance with PCI-DSS, Sarbanes-Oxley and other regulations, Novell* Sentinel* Log Manager enables you to collect, store, analyze and manage data logs from all across your enterprise. It is a powerful log management solution that lights a clear path to complete, real-time security information and event management.
Follow us on Twitter: @novellsentinel
PacketMotion, a compliance and security company, delivers the industry’s first User Activity Management (UAM) solution – a platform that automates compliance reports and controls while protecting critical enterprise data from insider threat. PacketMotion’s UAM platform monitors and controls the activity of all users including administrators, across operating systems, databases and applications. The company’s disruptive technology fills a gap created by other point products that don’t have the level of identity- awareness needed to fully control user activity. As a result, organizations are left exposed to insider threats and at risk of being out of compliance. By providing continuous monitoring of all user activity and real-time blocking of inappropriate behavior without using agents or in-line appliances, the PacketMotion solution dramatically reduces the cost of compliance, protects against insider threats, ensures data integrity, and guards against fraud.
Cost effective for organizations of all sizes, PacketMotion’s solution is being used by customers world-wide across industries including financial services, healthcare, pharmaceutical, high tech, insurance, manufacturing, retail, state and local government, and more. Backed by Mohr Davidow Ventures, an experienced management team, and a disruptive approach to identity-based user activity management, has earned the company the position of a Gartner “Cool Vendor” company. For more information, visit www.packetmotion.com.
Pico Computing offers scalable, FPGA-based platforms for embedded and high performance computing. Customer applications include cryptography, signal and video processing, DSP, bioinformatics and financial computing.
We specialize in highly integrated computing platforms based on Field Programmable Gate Array (FPGA) technologies. We offer standard and custom products, and we provide consulting and engineering services. We are the experts in FPGA-accelerated algorithms for data security.
Pico Computing E-Series cards are designed to be easy to use, fast to deploy, and scalable. Use a single E-Series card for rapid algorithm prototyping. Deploy your application as an embedded system, or scale to multiple FPGAs using an SC-Series FPGA cluster.
Pico EX-Series boards offer high performance for the most demanding data security applications. Deploy multiple EX-Series boards in a rack-mounted cluster for truly amazing levels of password cracking performance. Our latest FPGA computing board, the Pico EX-500, can be equipped with up to 12 Xilinx FPGAs on a single, 16-lane PCI Express card. Up to 11 EX-500 cards can be installed in a standard 4U rack mounted chassis.
Pico Computing is headquartered in Seattle, Washington and has customers worldwide. For more information or to request a free Data Security White Paper, visit www.picocomputing.com.
Red Lambda pioneered identity-aware network security technology in its P2P network security solution, Integrity. Using Red Lambda’s innovative private cloud framework, cGRID, Integrity’s high-performance identity awareness technology virtually eliminated illegal P2P use in every one of its installations. Entirely software-based, this solution provides real-time, highly accurate identification of network policy violators, eliminating anonymity and fundamentally changing user-behavior. Integrity is the only solution recommended by the U.S. Congress that meets all P2P deterrent criteria as mandated in the Higher Education Act.
At Black Hat 2010, Red Lambda is announcing an exciting new evolution of its breakthrough technology. This self-healing, cloud-based solution solves legacy problems that plagued networks for years. Its infinitely scalable performance effectively targets threats posed by newer technologies.
See us at booth 35, or visit www.redlambda.com during Black Hat to read more about the announcement that will set the standard for a new generation of network security solutions.
// BOOTH 35
RedSeal security posture management software enables organizations to continuously and accurately assess and strengthen their cyber-defenses. Unlike systems that detect attacks once they occur, RedSeal identifies security holes before hackers discover them. RedSeal delivers actionable steps for risk remediation and continuous compliance with regulations such as PCI, FISMA, and SOX.
RedSeal Network Advisor is automated security posture management software for network security. Every day, it gathers the configurations of all your network devices: firewalls, routers, load balancers, and more. It analyzes how the rules on all of these devices work together to defend business assets on your network. RedSeal validates this access control against both regulations and your own security policies to quickly identify mistakes and oversights that create potential attack paths. The result: you get the security you expected when you invested in your network devices in the first place.
RedSeal Vulnerability Advisor transforms scanning into actionable vulnerability management. Tightly integrated with and leveraging RedSeal Network Advisor’s network analysis, Vulnerability Advisor combines access information with your vulnerability scans. It identifies vulnerabilities that are exposed to un-trusted networks and those that are protected to generate a prioritized list of the vulnerabilities that pose the greatest business risk. Finally, RedSeal identifies gaps in your scanning so you know where to extend coverage to be secure.
Research In Motion Limited is a leading designer, manufacturer, and marketer of innovative wireless solutions for the worldwide mobile communications market. Through the development of integrated hardware, software, and services that support multiple wireless network standards, RIM provides platforms and solutions for seamless access to time-sensitive information including email, phone, SMS messaging, Internet and intranet-based applications. RIM technology also enables a broad array of third-party developers and manufacturers to enhance their products and services with wireless connectivity to data. RIM’s portfolio of award-winning products, services, and embedded technologies are used by thousands of organizations around the world and include the BlackBerry® wireless platform, the RIM Wireless Handheld™ product line, software development tools, radio-modems, and software/hardware licensing agreements. Founded in 1984 and based in Waterloo, Ontario, RIM operates offices in North America, Europe, and Asia Pacific. For more information, visit: www.rim.com or www.blackberry.com
SAINT Corporation, a global leader in network security, offers the first integrated vulnerability assessment and penetration testing. Examine your network with the SAINT vulnerability scanner, and expose where an attacker could breach your network. Go to a higher level of visibility with the SAINTexploit™ penetration testing tool and exploit the vulnerability to prove its existence without a doubt. The SAINT scanner and penetration testing tools are fully integrated within the same interface, making it easy to determine where to begin remediation—with the exploitable vulnerabilities found by the scanner. WebSAINT, the online SaaS (Software as a Service) vulnerability scanner, is ideal for organizations that need to perform vulnerability scans or meet PCI ASV third party quarterly scanning requirements. SAINT is a PCI Approved Scanning Vendor (ASV). WebSAINT Pro is the online SaaS solution that includes vulnerability scanning, penetration testing, and Web application scanning along with the full functionality of the award winning SAINT scanner and exploit technology. SAINT provides support to the Security Content Automation Protocol (SCAP) specification as an Unauthenticated Vulnerability Scanner and Authenticated Vulnerability and Patch Scanner. SAINT SCAP supports includes OVAL, CPE and CVE enumeration, and CVSS scoring.
SAINT can help to –
- Manage and reduce security risks to your network
- Document compliance with government and industry regulations like PCI, HIPAA, SOX, FISMA, and with internal policies
- Emulate potential attackers with the suite of exploit tools.
For more information, visit www.saintcorporation.com, call 1(800) 596-2006 x0119 or send a message to sales@saintcorporation.com.
Secure Mission Solutions (SMS) is a leading provider of end to end mission assurance services and solutions. We deliver our capabilities through two operating companies: WareOnEarth Communications and Sim-G Technologies. SMS provides world class expertise in all aspects of mission assurance and security, including: threat and vulnerability analysis, system/network design and development, Test & Evaluation, implementation, Certification and Accreditation, policy development and day to day operations and management of cyber-, physical- and integrated security systems. Our corporate focus is providing integrated mission assurance and integrated security solutions– in the physical, information, communications, cyber and personnel domains with core performance and capabilities in communications, network installation, protection and high-end analytical support ranging from intelligence analysis to policy development and consultation.
SMS is a solutions provider. Our customers include the full spectrum of Federal, DoD, Intelligence and Homeland Security organizations. From world-wide enterprise level to local area networks, SMS provides technical services in: (1) Information Assurance and CyberSecurity, (2) Critical Infrastructure Protection, (3) Command, Control and Intelligence, and (4) Communications, Network and General Engineering. While SMS performs on a wide range of contracts, our worldwide Information Assurance mission for the Defense Research and Engineering Network (DREN) demonstrates the breadth, depth and quality of our cyber capability. Our delivery of integrated physical security as the prime contractor for the US Army’s worldwide Integrated Commercial Detection System (ICIDS) highlights our physical security capabilities. SMS is headquartered in Reston, Virginia, with major operating elements in Washington, DC; Charleston, South Carolina and Chesapeake, Virginia.
SecureWorks is a market leading provider of world-class information security services with over 2,600 clients worldwide spanning North America, Latin America, Europe, the Middle East and the Pacific Rim. Organizations of all sizes, including more than ten percent of the Fortune 500, rely on SecureWorks to protect their assets, improve compliance and reduce costs. The combination of strong client service, award-winning security technology and experienced security professionals makes SecureWorks the premier provider of information security services for any organization. Positioned in the Leader’s Quadrant of Gartner’s Magic Quadrant for MSSPs, SecureWorks has also won SC Magazine's "Best Managed Security Service" award for 2006, 2007, 2008 & 2009 and has been named to the Inc. 500, Inc. 5000 and the Deloitte lists of fastest-growing companies.
SlimWare Utilities is a newly launched company that uses cloud technology and community-based input to develop software and services for cleaning, repairing, updating and optimizing personal computers and other Internet devices.
Founded on the premise that crowd-sourced applications will revolutionize the performance of personal computers, SlimWare Utilities software is designed to evolve, improve and become optimized into the fastest, coolest applications on the planet. Think utility software meets cloud computing meets Web 2.0.
Flagship products include SlimCleaner, SlimComputer and SlimDrivers. All use cloud and crowd-sourcing technology to gather community input from IT professionals and make unique, personalized decisions that improve a consumer’s computer hardware and software configurations.
At their heart, SlimWare Utilities products organize and sync data on a PC, clean and fix system errors, install updates, repair broken connections and provide overall maintenance to keep all of a consumer’s personal computing products – PCs, netbooks, tablets or Internet mobile devices – running better, faster and more effectively.
Headquartered near Biloxi, Miss., SlimWare Utilities provides all the essential tools that consumers and IT professionals need to repair and optimize computers, all in simple, single dashboard applications. SlimWare Utilities is a Microsoft Gold Certified Partner, and all of its software is developed in-house by technology professionals. Essential for running a clean, fully functioning computer, SlimWare Utilities products are available for free download at www.slimwareutilities.com. Contact us at info@slimwareutilities.com, or, call (228) 447-3175.
Solera Networks develops high-speed active network forensics solutions for both physical and virtual networks. These solutions are unmatched in speed and scalability—capturing, indexing, searching, and replaying all network traffic, even in 10Gb environments. The Solera Networks architecture provides open platform interoperability, extensible storage, and portability. These capabilities enable security professionals to quickly identify the source of any attack, remediate, and fortify against further risk.
Using their groundbreaking technology, Solera Networks also provides a suite of lossless traffic capture, index, storage and search products that can be used to strengthen Cybersecurity:
- Solera DS™ Capture Appliances – Full network capture (both packet header and payload), up to 10Gbps with onboard storage up to 16TB
- DS SAN – Add to Solera DS Appliances to expand and scale to any storage need.
- Solera DeepSee™ Forensics Suite – Complete indexing of all captured traffic and web-like searching for instant artifact reconstruction and replay of any network event. The suite includes DeepSee Reports™, DeepSee Search™ and DeepSee Sonar.™
- Solera Virtual Appliance – The only virtual capture appliance in the market that provides full capture, indexing, and replay for complete visibility within virtual environments.
- Solera APIs – Solera Networks offers REST-based APIs to allow third-party network analysis tool providers to directly integrate into Solera DS capture and network forensics appliances. With the REST APIs, these tools can make direct calls to the Solera DS file system and interface to provide full context to any security event.
Splunk was born from our founders’ frustration in managing and securing some of the world's largest IT infrastructures. Armed with state-of-the-art IT tools, they found it nearly impossible to locate the root cause of problems, investigate security attacks and assemble all the data required for compliance audits. Their conclusion: the silo approach to managing IT, with separate tools for every technology and IT function, was cumbersome, costly and didn't scale.
So, they founded Splunk to develop a new approach. The concept is simple. If Google can index and let users instantly search billions of pages of Web content, why not do the same for the datacenter? This new approach, called IT Search, is changing the way we manage, secure and audit IT infrastructures. Using Splunk IT Search software, organizations can now search and analyze all their IT data from one place in real time.
With Splunk, they can now troubleshoot outages, investigate security incidents and demonstrate compliance in minutes, instead of hours or days. Splunk arms IT with a new level of visibility and insight to protect critical resources, increase productivity and deliver improved service quality. Download a free version of Splunk today: http://www.splunk.com/download
StillSecure delivers comprehensive network security that protects organizations from the perimeter to the endpoint. Offering both products and managed security services, StillSecure enables customers to affordably deploy the optimal blend of technologies for locking down their assets and complying with security policies and regulations. StillSecure customers range from mid-market companies to the world's largest enterprises and agencies in government, financial services, healthcare, education, and technology. For more information please call (303) 381-3830, or visit http://www.stillsecure.com
Stonesoft is a global provider of proven, next generation solutions that simplify network security management. Stonesoft pioneered the market leading StoneBeat high availability solution in the 1990s. Today, Stonesoft innovations continue with the StoneGate Next Generation Platform which uniquely integrates the most advanced security solutions – StoneGate NextGen Firewall, IPS, SSL VPN and Virtual Security solutions – with our patented high availability technologies and sophisticated next generation management. Next generation management enables real-time monitoring, alerting, troubleshooting, managing and reporting from a single management console and database, giving administrators proactive control of both physical and virtual security networks. With more than 10,000 installations in more than 90 countries, Stonesoft customers represent many of the world’s largest organizations. For more information, visit: www.stonesoft.com/us
Sunbelt Software is a leading provider of endpoint and server-based security software for the enterprise, consumer and OEM markets. We protect millions of users globally against the rapidly evolving threat landscape.
With advanced technology solutions for endpoint anti-malware security, email security, and malware analysis tools, Sunbelt delivers comprehensive network protection with CWSandbox ™ analysis tools, ThreatTrack™ Data Feeds and the VIPRE® anti-malware product line.
Sunbelt CWSandbox provides for security vendors, ISPs and large enterprises the ability to rapidly analyze malware for many different purposes including: security research, creation of new signatures, forensic analysis and improved threat protection. Malware samples submitted to the sandbox are executed in a controlled environment, with a comprehensive analysis provided of the malware's execution in XML, HTML or text format. CWSandbox is the market leader for advanced dynamic behavioral analysis and now includes Digital Behavior Traits™ for intelligent threat detection.
For more information, visit: www.sunbeltsoftware.com
Tenable Network Security has pioneered and continues to innovate a unique Unified Security Monitoring approach that is revolutionizing the way enterprises are monitoring (i.e., gathering, evaluating, communicating and reporting) security and compliance information. Tenable's award-winning products are agentless solutions and architected for the continuous monitoring of vulnerabilities, configurations, data leakage, log management and compromise detection and are used by thousands of organizations both large and small around the world. Although Tenable is known primarily for its Nessus vulnerability scanner product, Tenable's Unified Security Monitoring solution consists of four fully integrated software applications: Tenable's Security Center, Nessus, the Passive Vulnerability Scanner and the Log Correlation Engine. Tenable Network Security is the pioneer and leader of Unified Security Monitoring.
An important strength of Tenable is the depth of security talent under one roof. Tenable's technical leaders have all created market leading and award winning products individually (Nessus, Dragon IDS, Gauntlet Firewall, TIS firewall tool kit) prior to joining forces at Tenable. Tenable's Unified Security Monitoring approach is their combined vision on how to monitor and secure enterprise networks. For more information, please visit: www.tenablesecurity.com
TippingPoint, now part of HP Networking, provides security solutions that secure next-generation data centers for enterprises, government agencies, service providers and academic institutions. The TippingPoint modern network security platform and intrusion prevention system (IPS) can be rapidly deployed, providing immediate protection at critical entry and isolation points in the network. With TippingPoint solutions, data centers remains protected through network security filters continually updated by Digital Vaccine® Labs (DVLabs), TippingPoint’s cutting-edge team of top security researchers. TippingPoint solutions automate most security functions, freeing organizations from the growing associated cost burden and helping security executives drive to zero administration. The TippingPoint solution sits transparently inline at critical points in the network, performing deep packet inspection to protect the data center, major segmentation points, network entry points, and the network core against current and emerging attacks originating from inside or outside the network. Through the TippingPoint Digital Vaccine filter update service, networks are protected against operating system, client-side application, and Web application vulnerabilities, as well as from zero-day threats. TippingPoint blocks traditional attacks such as worms, viruses, and Distributed Denial of Service (DDoS) attacks, as well as more cutting-edge threats, including cross-site scripting, SQL injection, and VoIP protocol attacks across the entire expanse of the data center network, covering the perimeter, DMZ, access network segments, and the network core.
Trusted Computer Solutions (TCS) has over sixteen years of experience in developing security solutions that meet stringent government requirements and have leveraged this expertise in bringing to market the first in a set of tools for the Linux® and Solaris™ communities. Security Blanket®, from TCS, is a next generation software tool that allows users to easily lock down installed Linux and Solaris operating systems and periodically check the security state on existing systems. Security Blanket is menu driven with an easy-to-use user interface. Users can run predefined profiles that will automate industry-standard best practices for hardening operating systems. The profiles are based on security guidelines developed by the security industries most respected authorities, such as the Defense Information Systems Agency (DISA), the Center for Internet Security (CIS), the Payment Card Industry (PCI) and Critical Infrastructure Protection (CIP). Alternatively, users of Security Blanket can customize profiles that support their own security policies. Once a profile is selected, Security Blanket quickly assesses the system and provides conformance indicators to show the status of the system’s conformance to the security guidelines. Security Blanket is extremely flexible allowing any lockdown action to be easily undone. Not only does Security Blanket greatly simplify the system hardening process for system administrators, but a robust set of reports record all actions performed on the system providing extensive auditing that helps monitor the security of systems over time.
// BOOTH 37
Trustwave is the leading provider of on-demand and subscription-based information security and compliance management solutions to businesses and government entities throughout the world. Trustwave has helped thousands of organizations ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers manage compliance and secure their network infrastructure, data communications and critical information assets.
SpiderLabs is Trustwave's advanced security team responsible for incident response & forensics, penetration testing and application security for Trustwave's clients. In addition, the team provides intelligence and research to enhance Trustwave's product and service offerings through real-world experience. SpiderLabs has responded to hundreds of security incidents, performed thousands of penetration tests, and security tested hundreds of business applications for the organizations ranging from the largest companies in the world to nimble startups. Members of SpiderLabs are frequently asked to speak at security conferences around the world including Black Hat, DEFCON, OWASP, SANS, SecTor, ShmooCon, SOURCE, ToorCon, and YSTS.
Trustwave is headquartered in Chicago with offices throughout North America, South America, Europe, Africa, Asia and Australia.
VMware (NYSE: VMW), the global leader in cloud infrastructure, delivers customer-proven virtualization solutions that significantly reduce IT complexity. VMware accelerates an organization's transition to cloud computing, while preserving existing IT investments and enabling more efficient, agile service delivery without compromising control. Organizations rely on VMware, its partners and its industry- leading virtual infrastructure platform, VMware vSphere, to energize their business through IT, while saving energy-financial, human and the Earth's. With 2009 revenues of $2 billion, VMware has more than 170,000 customers and 25,000 partners worldwide.
VSS Monitoring is the leading innovator of network traffic capture technology and the inventor of Distributed Traffic Capture Systems™, offering the most sophisticated, capability-rich product offering with the only fault-tolerant architecture available. Since its founding in 2003, VSS Monitoring’s mission has been to solve the pervasive efficiency, visibility and performance challenges inherent in deploying a variety of monitoring platforms within enterprise and carrier grade distributed networks. VSS’ highly scalable portfolio ranges from basic network taps through advanced traffic capture filtering devices that allow the user to perform data grooming and targeted extraction at speeds up to 10G and beyond. The company’s distributed, scalable technology fundamentally improves analyzer efficiency, maximizes ROI and establishes the pervasive, “always-on” visibility needed for effective network security and control.
For more information, visit: www.vssmonitoring.com
Visit us at booth #7 during the Black Hat Briefings.
Headquartered in Santa Clara, California, WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow the window of risk. WhiteHat Sentinel, the company’s flagship product family, is the most accurate, complete and cost-effective website vulnerability management solution available. It delivers the flexibility, simplicity and manageability that organizations need to take control of website security and prevent Web attacks. Furthermore, WhiteHat Sentinel enables automated mitigation of website vulnerabilities via integration with Web application firewalls and Snort-based intrusion prevention systems.
Tech Locker
Organizations under targeted attack by new and sophisticated malware use ValidEdge to quickly understand who is attacking them and how. Our flagship product, the ValidEdge MS 1100, is orders of magnitude faster than traditional analysis tools and provides deeper analytics than any other product on the market. The MIS 1100 appliance cracks open any packed or encrypted code and produces a full disassembly of the malware, a full behavior report and a complete logic execution path including the logic path for the latent code that has yet to trigger in under 10 seconds.
For more info, visit: www.validedge.com
Black Hat Speaker/VIP Party Sponsors
Red Lambda pioneered identity-aware network security technology in its P2P network security solution, Integrity. Using Red Lambda’s innovative private cloud framework, cGRID, Integrity’s high-performance identity awareness technology virtually eliminated illegal P2P use in every one of its installations. Entirely software-based, this solution provides real-time, highly accurate identification of network policy violators, eliminating anonymity and fundamentally changing user-behavior. Integrity is the only solution recommended by the U.S. Congress that meets all P2P deterrent criteria as mandated in the Higher Education Act.
At Black Hat 2010, Red Lambda is announcing an exciting new evolution of its breakthrough technology. This self-healing, cloud-based solution solves legacy problems that plagued networks for years. Its infinitely scalable performance effectively targets threats posed by newer technologies.
See us at booth 35, or visit www.redlambda.com during Black Hat to read more about the announcement that will set the standard for a new generation of network security solutions.
// BOOTH 35
SecureWorks is a market leading provider of world-class information security services with over 2,600 clients worldwide spanning North America, Latin America, Europe, the Middle East and the Pacific Rim. Organizations of all sizes, including more than ten percent of the Fortune 500, rely on SecureWorks to protect their assets, improve compliance and reduce costs. The combination of strong client service, award-winning security technology and experienced security professionals makes SecureWorks the premier provider of information security services for any organization. Positioned in the Leader’s Quadrant of Gartner’s Magic Quadrant for MSSPs, SecureWorks has also won SC Magazine's "Best Managed Security Service" award for 2006, 2007, 2008 & 2009 and has been named to the Inc. 500, Inc. 5000 and the Deloitte lists of fastest-growing companies.