Core Security Technologies

Core Security Technologies
Core Security
Type Private
Industry Computer Security
Vulnerability Management
Security Consulting Services
Founded 1996
Headquarters Boston, MA and Buenos Aires, Argentina
Key people Mark Hatton (President and CEO)
Employees ~ 200
Website www.coresecurity.com

Core Security Technologies is a computer and network security company that provides IT security testing and measurement software products and services. The company’s research arm, CoreLabs, proactively identifies new IT security vulnerabilities, publishes public vulnerability advisories, and works with vendors to assist in eliminating the exposures they find.[1]

Contents

History

  • 1996: Core Security was founded in Buenos Aires, Argentina.
  • 1997: The CoreLabs Research group was established and published their first advisory.
  • 1998: Core conducted its first penetration test for a U.S. company.
  • 1998: Core Security was recognized as an “Endeavor Entrepreneur” by the Endeavor Foundation, a foundation that supports entrepreneurial projects in emerging markets.
  • 2000: The company’s first U.S. office opened in New York, NY.
  • 2002: Core released the first and second versions of their flagship penetration testing product, Core Impact Pro.[2]
  • 2003: The company’s U.S. headquarters was relocated from New York to Boston, MA.
  • 2008: Mark Hatton becomes CEO of Core Security.[3]
  • 2009: Core adds development sites in Boston and India.
  • 2010: Core announces beta of new security testing and measurement product, Core Insight Enterprise

Company

Management Team[4]

  • Mark Hatton- President and Chief Executive Officer [5]
  • John O´Brien- Executive Vice President of Corporate Operations and CFO
  • Ivan Arce- Chief Technology Officer
  • Milan Shah- Senior Vice President of Engineering
  • Jeffrey Cassidy- Vice President and General Manager of South American Operations
  • Tom Kellermann- VP of Security Awareness and Government Affairs
  • Kimberly Legelis- Vice President of Marketing
  • Stephen Pace- Vice President of Sales and Services
  • Fred Pinkett- Vice President of Product Management
  • Paula Varas- Vice President of Engineering
  • Ariel Waissbein- Director of Research & Development
  • Alberto Soliño- Director of Security Consulting Services

Board of Directors[6]

  • Jonatan Altszul- Co-Founder, Core Security Technologies and Managing Director of Aconcagua Ventures
  • Shinya Akamine- CEO, BlueRoads Corp.
  • Jeronimo Bosch- Pegasus Capital
  • Peter Chung- Morgan Stanley Venture Partners
  • Edward Hamburg- Morgan Stanley Venture Partners
  • Mark Hatton- President and CEO, Core Security Technologies
  • Robert Steinkrauss- CEO, ChosenSecurity, Inc

.

Advisory Board

The Core Advisory Board helps to guide the company’s business strategy, vulnerability research and product development plans.[7]

Products

Core Impact Pro: a penetration testing software solution that replicates cyber attacks to assess the security of web applications, network systems, endpoint systems, email users and wireless networks [10][11]

Core Insight Enterprise: a security testing and measurement product for large environments that will be available in late 2010 [12]

Services

Security Consulting Services: in-depth penetration testing and source code auditing services

CORE IMPACT Professional Services: penetration testing services based on the company’s CORE IMPACT product [13]

CORE IMPACT Certified Professional (CICP) Training and Certification: advanced penetration testing training for IT security practitioners and consultants [14]

Facilities

Core Security is headquartered in Boston, MA, and Buenos Aires, Argentina.

Research and Advisories

Core Security’s research department, CoreLabs, conducts research in various areas of computer security, including system vulnerabilities, cyber attack planning and simulation, source code auditing and cryptography. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use, with its researchers participating in many IT security research conferences including the Black Hat Briefings .[15][16]

Recent Advisories

  • Microsoft Windows CreateWindow function callback vulnerability[17]
  • Microsoft Office Excel PivotTable Cache Data Record Buffer Overflow[18]
  • HP OpenView NNM OvJavaLocale Buffer Overflow Vulnerability[19]

See also

References

  1. ^ http://www.bizjournals.com/boston/stories/2010/08/30/story11.html
  2. ^ http://www.coresecurity.com/content/core-security-technologies-announces-first-comprehensive-penetration-testing
  3. ^ http://www.coresecurity.com/content/core-security-technologies-appoints-new-ceo-relocates-corporate
  4. ^ http://www.coresecurity.com/content/management-team
  5. ^ http://www.coresecurity.com/content/core-security-technologies-appoints-new-ceo-relocates-corporate
  6. ^ http://www.coresecurity.com/content/board-of-directors
  7. ^ http://www.coresecurity.com/content/core-advisory-board
  8. ^ http://newsroom.cisco.com/dlls/2010/prod_020210c.html
  9. ^ http://www.coresecurity.com/content/board-of-directors
  10. ^ http://www.coresecurity.com/content/security-testing-and-penetration-testing-products-and-services
  11. ^ http://www.infoworld.com/d/security-central/product-review-core-impact-penetration-tester-goes-phishing-390
  12. ^ http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1516321,00.html
  13. ^ http://www.coresecurity.com/content/Professional-Services
  14. ^ http://www.securitypark.co.uk/security_article263506.html
  15. ^ http://www.coresecurity.com/content/corelabs-advisories
  16. ^ http://www.computerworld.com/s/article/9176373/Security_firm_reveals_Microsoft_s_silent_patches?taxonomyId=17&pageNumber=1
  17. ^ http://www.coresecurity.com/content/microsoft-windows-createwindow-function-callback-bug
  18. ^ http://www.coresecurity.com/content/CORE-2010-0407-Excel-PivotTable-CDR-overflow
  19. ^ http://www.coresecurity.com/content/hp-nnm-ovjavalocale-buffer-overflow

External links


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Core Impact — Infobox Software name = Core Impact developer = Core Security Technologies latest release version = 7.5 latest release date = December, 2007 operating system = Microsoft Windows genre = Security website = [http://www.coresecurity.com/… …   Wikipedia

  • Security Practices and Research Student Association — The Security Practices and Research Student Association (SPARSA) is a Rochester Institute of Technology student run organization that addresses security related issues and how these issues affect multiple majors and disciplines. The ultimate goal …   Wikipedia

  • Security Assertion Markup Language — (SAML) is an XML based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product… …   Wikipedia

  • Security engineering — is a specialized field of engineering that focuses on the security aspects in the design of systems that need to be able to deal robustly with possible sources of disruption, ranging from natural disasters to malicious acts. It is similar to… …   Wikipedia

  • Security Assertion Markup Language — (SAML) est un standard informatique définissant un protocole pour échanger des informations liées à la sécurité. Basé sur le langage XML, SAML a été développé par OASIS. Le problème le plus important que SAML tente de résoudre est celui de l… …   Wikipédia en Français

  • Security assertion markup language — (SAML) est un standard informatique définissant un protocole pour échanger des informations liées à la sécurité. Basé sur le langage XML, SAML a été développé par OASIS. Le problème le plus important que SAML tente de résoudre est celui de l… …   Wikipédia en Français

  • Security Operation Center (computing) — A Security Operation Center (SOC) is an organization that delivers IT security services. It attempts to prevent unauthorized access and manage security related incidents using processes and procedures. The mission is risk management through… …   Wikipedia

  • Core Architecture Data Model — Example of a CADM Diagram for Overview and Summary Information (AV 1) of the DoDAF.[1] Core Architecture Data Model (CADM) in Enterprise Architecture is a logical data model of information used to describe and build architectures …   Wikipedia

  • Security and safety features new to Windows Vista — There are a number of security and safety features new to Windows Vista, most of which are not available in any prior Microsoft Windows operating system release.Beginning in early 2002 with Microsoft s announcement of their Trustworthy Computing… …   Wikipedia

  • Core area network — A core area network is an island network that exists within both LANs and WANs offering both collaboration and hard security within the domain. The configuration of a CAN structure is done using existing hard and soft technologies and depends… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”