atsec information security is an independent, privately owned company that focuses on providing laboratory and consulting services for information security. We address commercial and government sectors around the world. Our consultants are expert in a variety of technologies including operating systems, databases, and network devices. Our laboratories specialise in evaluating and testing commercial products, using international standards to help provide assurance to end-users about the products they buy and use. We focus on assisting organizations, large and small, achieve compliance with standards such as Common Criteria, FIPS 140-2, O-TTPS, PCI, ISO/IEC 27001 and FISMA and offer a variety of services that complement that goal.
Cryptsoft is an Australian company that operates worldwide in the enterprise key management security market. Cryptsoft’s Key Management Interoperability Protocol (KMIP) and Public Key Cryptography Standard 11 (PKCS#11) software development kits are industry’s preferred OEM solutions. Cryptsoft’s solutions have been selected by prominent global companies for interoperable enterprise key management and encryption technology for storage, infrastructure, security and cloud products. Cryptsoft is committed to developing standards based security software and is an OASIS Foundational Sponsor.
Secure Software for the Internet of Things – Allegro Software is a leading provider of embedded Internet software toolkits to product developers worldwide. Field proven in 200,000,000+ devices, our solutions enable manufacturers of hardware, software and digital products in the Military, Energy, Healthcare, Enterprise and Consumer markets to create connected secure devices using TLS, Suite B, FIPS 140-2 capabilities and more.
Brightsight is the largest independent security evaluation lab in the world. We have over 30 years of experience in evaluating security products against a variety of requirements, including Integrated Circuits, Embedded Systems (Medical, IoT, Automotive), Smart Cards & Software components, Payment terminals, Mobile Payment solutions, including HCE, TEE, eSE, Telecommunication products, Smart Meters and Biometrics solutions.
One of the world’s leading companies for PKI solutions, PrimeKey has developed successful technologies such as EJBCA Enterprise, SignServer Enterprise and PrimeKey PKI Appliance. PrimeKey is a pioneer in open source security software that provides businesses and organisations around the world with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.
Providing end-to-end services across a variety of security standards (Common Criteria, FIPS 140-2, ISO 19790, SCAP, DoDIN APL, CSfC, ANSI/UL 2900, PCI PTS POI & HSM, ISO 20243 O-TTPS), EWA-Canada and Acumen Security partner with you to streamline your security certifications and approvals, resulting in a more cost-effective and efficient experience with a faster time to market. As companies of Intertek, a provider of Total Quality Assurance services, Acumen Security and EWA-Canada share an unprecedented network of industry experts worldwide, providing our customers with a competitive edge in the global market place. Our services include Requirements Consulting, Gap Analysis & Strategy Workshops, Documentation development, Algorithm testing, Lab services, Penetration Testing & Vulnerability Assessments, and FIPS 140-2 Compliance Audits.
Understanding the level of product security available in each IT offering can be confusing. That is why having a global, independent, well-documented, and certifiable security baseline across products eases the product comparison and procurement decision-making process. Cisco relies on the external, well-known, and transparent nature of global certifications as a foundational baseline for its Trustworthy Systems Initiative.
Learn more at trust.cisco.com
With head offices in the UAE and serving regional and global customers, DarkMatter is a team of cyber security specialists dedicated to providing secure, trusted and integrated protection services. As a trusted partner to the UAE government, we have the proven integrity, intelligence and cyber security capability to safeguard a nation. Technology has changed the world beyond measure. Digital progress has made lives easier and businesses more efficient. However, with technological progress comes many threats to Government, Enterprise and Individuals. We are transforming the cyber security landscape through a complete range of state of the art services and solutions for government security agencies all the way to businesses and individuals.
SafeLogic’s product line is focused on standards-based cryptographic engines designed for use in mobile, Cloud, server, wearable, IoT, workstation, and appliance environments. SafeLogic modules include RapidCert, the industry’s only FIPS 140-2 validation service that provides a certificate in the customer’s name, while drastically accelerating the timeline, requiring no additional engineering effort, zero interaction with testing labs, and at a fixed cost. SafeLogic was established in 2012, is privately held, and is headquartered in Palo Alto, California
Teron Labs is an independent security testing laboratory, based in Australia, but with a global reach. Our goal is to help organisations around the world to gain certifications in a timely and predictable manner. We understand that delays in the certification process can result in a loss of sales for your business, therefore, we are able to work with you closely throughout the product development and evaluation processes to make sure that your product is able to be certified without encountering any roadblocks. Unlike other laboratories, which are embedded within large multinational and general cyber security services organisations, the focus of Teron Labs is security testing of ICT products, specialising in FIPS 140-2 and Common Criteria. This focus, together with a simpler business structure and low overheads, provides Teron Labs with a competitive edge in delivering personalised consulting and testing solutions.
Bloombase is the intelligent storage firewall company providing artificial intelligence discovery, deep learning-powered dynamic access control, and autonomous life-cycle cryptography of sensitive data-at-rest from physical and virtual data centers, through hyper-converged infrastructure, to the cloud, enabling organizations to secure their crown-jewels, mitigate data breach threats, and help meet regulatory compliance mandates without human intervention.
CygnaCom Solutions Inc. specializes in information assurance and product certification. We offer a full range of security certification, testing and consultancy services enabling our clients to meet the standards required by many government and regulatory bodies. Our staff of highly qualified professionals will guide your team through evaluations, validations, certifications, and assessments to ensure on time and within budget procurement eligibility and compliance. CygnaCom Solutions laboratories are accredited to conduct FIPS 140-2 cryptographic module (CMVP) and algorithm testing and Common Criteria evaluations in US (NIAP), Canada (CSE) and Turkey (TSE).
jtsec is a cybersecurity company offering consulting services for security evaluation and certification according to the most recognized market standards (Common Criteria, FIPS 140-2, PCI-PTS, PCI SPoC).
jtsec is made up by a team of recognized professionals in the IT security sector with more than 30 years experience in this field. Most of our professionals have worked as evaluators, consultant and lab managers in different laboratories.
Our principles (technical excellence, commitment to our customers and time to market) allows us to provide a high quality service. Do you need a cybersecurity certification? Partner with us and relax!
Visit our website to learn more:https://www.jtsec.es/.
Members of the PKCS11 Committee including Cryptsoft, Intel, nCipher, and Utimaco will be available to answer questions and provide demonstrations of the latest revision of the PKCS11 standard. Each member will showcase their implementation of the specification including generating, finding and using cryptographic objects with combinations of one or more symmetric keys, asymmetric keys, or certificates.
PKCS11 TC is part of the OASIS Open Standards Network. Please join and participate in the evolution of PKCS11.
QuintessenceLabs is the leader in quantum-enhanced cyber security solutions that address the toughest security challenges. Our products provide the strongest data protection, freeing you up to focus on your business. Our key & policy manager, high speed quantum random number generator, and integrated encryption solutions will keep your information safe, everywhere.
Dedicated to making data faster and safer, Rambus creates innovative hardware, software and services that drive technology advancements from the data center to the mobile edge. Our architecture licenses, IP cores, chips, software, and services span memory and interfaces, security, and emerging technologies to positively impact the modern world.
The wolfSSL embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by the robust wolfCrypt cryptography library, and much more. The CMVP has issued FIPS 140-2 Certificate #2425 for the wolfCrypt Module.
ACT Canada helps members understand complex issues and filter truth from market noise for current and emerging commerce trends. Through a consultative approach with all stakeholder groups, the association provides knowledge and expertise to help members leverage opportunities, confront challenges and advance their businesses in a rapidly changing marketplace.
Our core pillars are to:
Engage – Grow the commerce community via stakeholder contributions, collaboration and networking.
Enable – Provide access to the expertise of the member community to gain insights that will help strategic decision-making.
Evolve – Drive positive change in the increasingly complex commerce environment.
AEGISOLVE Cyber Security Laboratories accelerates your time to market with proven security analysis and testing processes. Headquartered in Silicon Valley, California, AEGISOLVE is an accredited industry leader, providing FIPS 140-2 validations for over a decade.
AQNIU is the only private research institute focusing on network security industry in China. It is committed to popularization,sharing and recommending network security knowledge and technology, building a platform for different organizations and people.
News reports, industry analysis, survey reports and conference activities are the main business of the AQNIU.Gartner (technology)、IDC (statistics),and the solution (landing)。These is the development form of AQNIU.
The Common Criteria Users Forum (CCUF) was founded in 2012 and is a community based around those using the Common Criteria and ISO/IEC 15408 standards. The Common Criteria Users’ Forum mission is to provide a voice and communications channel between the CC community and the CC organizational committees, CC evaluation schemes, and policy makers. To join, go to http://www.ccusersforum.org/.
The Cryptographic Module User Forum (CMUF) mission is to provide a voice and communications channel between the community of UNCLASSIFIED cryptographic module (CM) and UNCLASSIFIED cryptographic algorithm developers, vendors, consultants, test labs and other interested parties, and the various national, international, and multi-lateral organizational committees, schemes, and policy makers. To Join the CMUF contact any CMUF Steering Committee member.
Crypto Workshop was set up to help people better use and understand the Bouncy Castle Cryptography APIs. In addition to maintaining the Bouncy Castle APIs and managing the FIPS 140-2 certified versions, we help our clients to make the most of their use of the Bouncy Castle APIs and keep the Bouncy Castle APIs supported and Open Source.
With Java, Android, and C# .NET versions, we have clients across a range of industries and application spaces, but overall they fall into three categories. Some who have support contracts in place simply to avoid developers getting stalled – it being cheaper and more effective for developers to call on us directly.
Some using our tools and services to help do private certifications of the Bouncy Castle FIPS APIs for their own purposes. Finally, there are those who take advantage of our FIPS early access program to accelerate product development and deployment.
GlobalPlatform is a non-profit industry association driven by approximately 100 member companies. Members share a common goal to develop GlobalPlatform’s specifications, which are today highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle. GlobalPlatform protects digital services by standardizing and certifying a security hardware/firmware combination, known as a secure component, which acts as an on-device trust anchor. This facilitates collaboration between service providers and device manufacturers, empowering them to ensure the right level of security within all devices to protect against threats. Market sectors adopting GlobalPlatform technology include automotive, healthcare, government and enterprise ID, payments, premium content, smart cities, smart home, telecoms, transportation, and utilities.
Homeland Security Today (HSToday) is a 501(c)(6) nonprofit association media outlet dedicated to informing and supporting the efforts of public, private, nonprofit, and academic organizations and practitioners engaged in the homeland security mission. Since its inception as a for-profit publication in 2004, HSToday has provided award-winning news and analysis revealing the challenges, opportunities and successes of the United States’ homeland and national security and intelligence communities.
Homeland Security Today covers breaking news for the homeland security community, and now, with GTSC as its umbrella, will cover the federal homeland security market in-depth.
Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts.
Infosecurity Magazine also provides free educational content, endorsed by all major industry accreditation bodies and is therefore considered a key learning resource for industry professionals.
Cybersecurity has come a long way in 25 years, and InfoSec World has been there through it all.
That’s right, InfoSec World 2019 Conference & Expo is returning to Disney’s Contemporary Resort on April 1-3, 2019, and we’re celebrating 25 years of being the business of security conference. Join your peers and our experts as we come together as a community once again to not only sharpen our cybersecurity skills, but to discover what it takes to be a valued business partner and enabler as well. Save 20% off with discount code OS19-ICMC at checkout!
ISARA is the largest organization in the world focused solely on developing quantum-safe cryptographic solutions for integration into commercial products to protect against emerging security threats. As businesses and governments around the world seek to protect themselves from emerging cybersecurity threats, they are making long-term strategic bets on emerging technologies to address their future business needs. ISARA’s mission is to help our customers take important steps to address the next generation of privacy and security concerns in the quantum age. The ISARA Radiate Security Solution Suite is the first commercial offering of a high-quality implementation of quantum resistant algorithms and related integration tools built for developers. It allows organizations and OEMs to integrate critical, quantum-safe security measures into commercial products and networks today, and facilitates the transition to crypto agility in enterprise security. ISARA’s R&D engagements include Canadian and UK Government agencies and several top 10 banks in North America. ISARA’s optimized quantum resistant algorithms for governments and large enterprises preserve user experience and performance while providing the highest levels of next generation security. ISARA has 30+ employees at its headquarters in Waterloo, Ontario, many with years of experience in technology companies, including BlackBerry, Certicom, Oracle, and McAfee, and academic and research institutions, including the Institute for Quantum Computing (IQC) and the Perimeter Institute. The ISARA team has expertise building high performance cryptographic systems for constrained environments.
The Payments Summit is the premier industry event covering all things payments, including FinTech, EMV chip technology, mobile wallets, NFC, contactless, open transit systems and more. Attend the 12th annual Payments Summit and get the latest on all of these exciting technologies and the many business opportunities they can unlock.
2019 will mark the second year that the Secure Technology Alliance and the U.S. Payments Forum are combining the Payments Summit with the U.S. Payments Forum All-Member Meeting, resulting in the most comprehensive gathering of card and payments professionals than ever before!
Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, and secure authentication and strong protection of user identities. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance. Through its member-driven work groups, TCG enables the benefits of trust in computing devices from mobile to embedded systems, as well as networks, storage, infrastructure, and cloud security.