Type | Private |
---|---|
Industry | Computer Security Vulnerability Management Security Consulting Services |
Founded | 1996 |
Headquarters | Boston, MA and Buenos Aires, Argentina |
Key people | Mark Hatton (President and CEO) |
Employees | ~ 200 |
Website | www.coresecurity.com |
Core Security Technologies is a computer and network security company that provides IT security testing and measurement software products and services. The company’s research arm, CoreLabs, proactively identifies new IT security vulnerabilities, publishes public vulnerability advisories, and works with vendors to assist in eliminating the exposures they find.[1]
Contents |
Management Team[4]
Board of Directors[6]
.
Advisory Board
The Core Advisory Board helps to guide the company’s business strategy, vulnerability research and product development plans.[7]
Core Impact Pro: a penetration testing software solution that replicates cyber attacks to assess the security of web applications, network systems, endpoint systems, email users and wireless networks [10][11]
Core Insight Enterprise: a security testing and measurement product for large environments that will be available in late 2010 [12]
Security Consulting Services: in-depth penetration testing and source code auditing services
CORE IMPACT Professional Services: penetration testing services based on the company’s CORE IMPACT product [13]
CORE IMPACT Certified Professional (CICP) Training and Certification: advanced penetration testing training for IT security practitioners and consultants [14]
Core Security is headquartered in Boston, MA, and Buenos Aires, Argentina.
Core Security’s research department, CoreLabs, conducts research in various areas of computer security, including system vulnerabilities, cyber attack planning and simulation, source code auditing and cryptography. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use, with its researchers participating in many IT security research conferences including the Black Hat Briefings .[15][16]
Recent Advisories