Cisco is the worldwide leader in networking that transforms how people connect, communicate, and collaborate. Cisco has a substantial commitment to protecting customers and the Internet infrastructure and has robust incident response and vulnerability handling procedures. Cisco’s Product Security Incident Response Team (PSIRT) is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability-related information related to Cisco products and networks. The on-call PSIRT team works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.
Intel, the world leader in silicon innovation, develops technologies, products, and initiatives to continually advance how people work and live. Intel is also focused on ensuring the security of computing environments and committed to a rapid response while providing recommendations through security advisories and security notices. Intel’s Product Security Incident Response Team (iPSIRT) proactively searches for and responds to reported security vulnerabilities in Intel products. Working with members of the security community, customers, and end users, iPSIRT ensures that security vulnerabilities are documented and clear solutions are released to customers in a timely, responsible fashion.
International Business Machines is the world’s largest information technology company, with 80 years of leadership in helping businesses innovate. IBM is dedicated to helping customers, business partners, and developers across a wide range of industries leverage the power of the Internet for e-business.
As the world's leading provider of risk and security solutions, clients around the world partner with IBM to help reduce the complexities of security and strategically manage risk. No other company can provide the experience and range of risk and security solutions as IBM—from dedicated research, software, hardware, services, and global business partner value—to help clients secure their business operations and implement company-wide, integrated risk management programs. IBM’s security products and services are based on the proactive security intelligence of its X-Force research and development team—the unequivocal world authority in vulnerability and threat research.
For more information, visit www-03.ibm.com/security/.
Juniper Networks is the leader in high-performance networking. Juniper offers innovative businesses a high-performance network infrastructure to help them create a responsive and trusted environment for accelerating the deployment of services and applications over a single network. The top 65 service providers, 96 of the Fortune 100, and large government agencies and institutions are among the many demanding businesses that rely on Juniper Networks to quickly meet their high-performance business requirements. The company is headquartered in Sunnyvale, California. Juniper Networks is publicly traded on NASDAQ under the symbol JNPR.
For more information, visit www.juniper.net.
Microsoft is motivated and inspired every day by how its customers use its software to find creative solutions, develop ideas, and stay connected to what is important to them. Just as the company constantly updates and improves its products, it wants to continually evolve to accelerate new, emerging technologies and to better serve its customers. However, as more people and businesses rely on computing every day, the threats that can undermine trust in computing are increasingly sophisticated and malicious.
Microsoft’s approach to the changing threat landscape is Trustworthy Computing, a long-term collaborative effort to create and deliver secure, private, and reliable computing experiences for everyone. When a security issue threatens customers, the Microsoft Security Response Center (MSRC), a global security response team created to protect people and organizations from vulnerabilities, quickly mobilizes teams across Microsoft and the world to evaluate the threat, develop mitigations, and provide customers with guidance.
For more information, visit www.microsoft.com.
Nokia is a pioneer in mobile telecommunications and the world's leading maker of mobile devices. Today, we are connecting people in new and different ways — fusing advanced mobile technology with personalized services to enable people to stay close to what matters to them. We also provide comprehensive digital map information through NAVTEQ; and equipment, solutions, and services for communications networks through Nokia Siemens Networks.
Nokia has extensive experience in developing comprehensive and systematic security engineering principles. At Nokia, security is an integral part of our products, solutions, and technologies. Nokia is also participating in several industry initiatives designed to drive technical specifications for improving security.
Amazon.com, Inc., a Fortune 500 company based in Seattle, opened on the World Wide Web in July 1995 and today offers Earth's Biggest Selection. Amazon.com seeks to be Earth's most customer-centric company, where customers can find and discover anything they might want to buy online, and endeavors to offer its customers the lowest possible prices. Amazon.com and other sellers offer millions of unique, new, refurbished, and used items in categories such as Books; Movies, Music, & Games; Digital Downloads; Electronics & Computers; Home & Garden; Toys, Kids, & Baby; Grocery; Apparel, Shoes, & Jewelry; Health & Beauty; Sports & Outdoors; and Tools, Auto, & Industrial. Amazon Web Services provides Amazon's developer customers with access to in-the-cloud infrastructure services based on Amazon's own back-end technology platform, which developers can use to enable virtually any type of business. Kindle, Kindle 3G, and Kindle DX are the revolutionary portable readers that wirelessly download books, magazines, newspapers, blogs, and personal documents to a crisp, high-resolution electronic ink display that looks and reads like real paper. Kindle 3G and Kindle DX utilize the same 3G wireless technology as advanced cell phones, so users never need to hunt for a Wi-Fi hotspot. Kindle is the #1 bestselling product across the millions of items sold on Amazon. For more information, visit www.Amazon.com.
With more than 380,000 customers—including 100 of the Fortune 100—and with deployments across a wide variety of industries in more than 145 countries around the globe, Oracle offers an optimized and fully integrated stack of business hardware and software systems that helps organizations overcome complexity and unleash innovation. Oracle engineers hardware and software to work together in the cloud and in your data center–from servers and storage, to database and middleware, through applications.
Security is a key priority at Oracle. Encompassing every phase of the product development lifecycle, Oracle Software Security Assurance is Oracle's methodology for building security into the design, build, testing, and maintenance of its products. Oracle's goal is to ensure that Oracle's products, as well as the customer systems that leverage those products, remain as secure as possible. For more information, visit http://www.oracle.com/us/support/assurance/index.html.
Research In Motion Limited
Research In Motion (RIM), a global leader in wireless innovation, revolutionized the mobile industry with the introduction of the BlackBerry® solution in 1999. BlackBerry Security is a world class organization working to make BlackBerry one of the most secure mobile platforms available by providing an end to end security focus including: driving the BlackBerry security message globally, acquiring and maintaining security accreditations, active involvement in the development of security products, uncovering threats through advanced research, building mitigations into BlackBerry products, and helping to protect customers by rapidly responding to security incidents as they occur. For more information, visit http://www.blackberry.com/security.