Core Security Technologies

Core Security
Type Private
Industry Computer Security
Vulnerability Management
Security Consulting Services
Founded 1996
Headquarters Boston, MA and Buenos Aires, Argentina
Key people Mark Hatton (President and CEO)
Employees ~ 200
Website www.coresecurity.com

Core Security Technologies is a computer and network security company that provides IT security testing and measurement software products and services. The company’s research arm, CoreLabs, proactively identifies new IT security vulnerabilities, publishes public vulnerability advisories, and works with vendors to assist in eliminating the exposures they find.[1]

Contents

History

Company

Management Team[4]

Board of Directors[6]

.

Advisory Board

The Core Advisory Board helps to guide the company’s business strategy, vulnerability research and product development plans.[7]

Products

Core Impact Pro: a penetration testing software solution that replicates cyber attacks to assess the security of web applications, network systems, endpoint systems, email users and wireless networks [10][11]

Core Insight Enterprise: a security testing and measurement product for large environments that will be available in late 2010 [12]

Services

Security Consulting Services: in-depth penetration testing and source code auditing services

CORE IMPACT Professional Services: penetration testing services based on the company’s CORE IMPACT product [13]

CORE IMPACT Certified Professional (CICP) Training and Certification: advanced penetration testing training for IT security practitioners and consultants [14]

Facilities

Core Security is headquartered in Boston, MA, and Buenos Aires, Argentina.

Research and Advisories

Core Security’s research department, CoreLabs, conducts research in various areas of computer security, including system vulnerabilities, cyber attack planning and simulation, source code auditing and cryptography. CoreLabs regularly publishes security advisories, technical papers, project information and shared software tools for public use, with its researchers participating in many IT security research conferences including the Black Hat Briefings .[15][16]

Recent Advisories

See also

References

  1. ^ http://www.bizjournals.com/boston/stories/2010/08/30/story11.html
  2. ^ http://www.coresecurity.com/content/core-security-technologies-announces-first-comprehensive-penetration-testing
  3. ^ http://www.coresecurity.com/content/core-security-technologies-appoints-new-ceo-relocates-corporate
  4. ^ http://www.coresecurity.com/content/management-team
  5. ^ http://www.coresecurity.com/content/core-security-technologies-appoints-new-ceo-relocates-corporate
  6. ^ http://www.coresecurity.com/content/board-of-directors
  7. ^ http://www.coresecurity.com/content/core-advisory-board
  8. ^ http://newsroom.cisco.com/dlls/2010/prod_020210c.html
  9. ^ http://www.coresecurity.com/content/board-of-directors
  10. ^ http://www.coresecurity.com/content/security-testing-and-penetration-testing-products-and-services
  11. ^ http://www.infoworld.com/d/security-central/product-review-core-impact-penetration-tester-goes-phishing-390
  12. ^ http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1516321,00.html
  13. ^ http://www.coresecurity.com/content/Professional-Services
  14. ^ http://www.securitypark.co.uk/security_article263506.html
  15. ^ http://www.coresecurity.com/content/corelabs-advisories
  16. ^ http://www.computerworld.com/s/article/9176373/Security_firm_reveals_Microsoft_s_silent_patches?taxonomyId=17&pageNumber=1
  17. ^ http://www.coresecurity.com/content/microsoft-windows-createwindow-function-callback-bug
  18. ^ http://www.coresecurity.com/content/CORE-2010-0407-Excel-PivotTable-CDR-overflow
  19. ^ http://www.coresecurity.com/content/hp-nnm-ovjavalocale-buffer-overflow

External links