SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078
__________________________________________________________________________________________
__________________________________________________________________________________________
1/2
OVERVIEW - Validy licenses a breakthrough Software Assurance technology, called “Validy Technology”, ensuring
both software trustworthiness and predictable execution. Validy Technology achieves protection by combining software
code transformations with a piece of secure hardware, behaving as a co-processor. It is independent of Operating Systems
and is able to secure embedded systems as well as traditional computer programs. Validy addresses global markets: from
automobiles to banking systems, from aeronautics to telecommunication networks from computing equipments to
consumer electronics. Validy Technology is the result of 9 years of R&D. Validy has been granted 10 patents and is
extending them in more than 50 countries. Given the numerous market segments encompassed by the technology, Validy
has chosen a business model based on Licensing. Validy Technology’s key differentiation from competition consists in
its ability to ensure by itself the integrity of software during execution, without any third-party help. Thus it can be
viewed as the new self-defense solution for electronic and IT equipments.
MARKET HIGHLIGHTS - Validy addresses global markets: Homeland Security to banking systems, aeronautics to
telecommunication networks, computing equipments to consumer electronics. Today, the company is focusing on the
protection of Energy etwork Distribution (SCADA), embedded software in cars and embedded software in
mobile phones. A strategic target in those markets consists in securing security software programs: Those programs,
more than any others, must be able to run correctly without being diverted from their normal behavior by pirates. Validy is
also taking particular care of the embedded systems market for which Validy Technology is a definitive answer to ensure
justifiable confidence in the field.
TECHNOLOGY - Validy Technology protects software against sabotage, cyber-criminality, cyber-terrorism and
is a basic building block for Software Assurance. Any program protected by Validy Technology continuously checks its
own integrity while running and takes reprisals if any problem is detected (Detection and Coercion patent). Validy
Technology’s mutual check mechanism even extends the protection to distributed architectures. For instance, a client is
protected by its server and a server is protected by its clients. To put into place the protection of a program, the developer
needs to compile it with the Validy post-compiler. While running, the secure co-processor becomes an extension of the
main processor and provides the protection. The update of an existing program using the Validy protection is very simple:
The developer has to use the same parameters when running the post-compiler and the existing co-processors will run
with the "new" program. Depending on the application, the co-processor can be housed under various form-factors: USB
Key, Surface Mount Chip, SIM, … There is no need to change the architecture to add protection. Developers can continue
to use their usual development tool.
REFERENCE IMPLEMENTATION - In order to offer a working example to licensees, Validy has developed
“Validy Soft aos for Java”, a Reference Implementation of Validy Technology using a co-processor housed inside a USB
token. Since the technology doesn’t rely on any secret information, Validy Soft aos for Java not only shows a possible
implementation of the technology but is at the same time a real product providing great protection against piracy (illegal
software copy). Given this capability, it can be used by software publishers who develop Java applications and we market
it as such.
The Validy SoftNaos USB Token
EXAMPLES - Validy technology is able to efficiently secure Electric Distribution etwork by protecting Supervisory
Control And data Acquisition (SCADA) software as well as software embedded in electric equipments involved in
electric distribution. The protection is really effective because Validy Technology protects software during its execution.
This feature is particularly important for high availability systems and high criticity systems like electric distribution. The
protection is simple to deploy. During upgrades, there is no need to change the Validy co-processor protecting the
software embedded in electric equipments on the field: the instructions aren’t stored in the co-processor but are directly
EXECUTIVE SUMMARY
Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078
__________________________________________________________________________________________
__________________________________________________________________________________________
2/2
sent to the coprocessor on the fly during execution. Electric Distribution companies will find a cheap and efficient
solution to protect their electric distribution network from cyber-criminality and cyber-terrorism.
Validy technology is able to efficiently secure embedded software in cars. As soon as a piece of software is detected as
corrupted, the retaliation countermeasure keeps the behavior of the car safe for the driver. Car manufacturers will
appreciate this solution to guarantee the safety of their cars.
Validy Technology is able to secure embedded software in a smartphones. With Validy Technology, the user will not be
able to jailbreak his smartphone. Phone manufacturer or telecom companies will appreciate this feature to guarantee their
business model.
Validy’s technology has a strong differentiation from the solution of competitors like TPM module because it is easier to
use and really more secure ensuring the security of the software during its execution.
COMPETITIVE EDGE - Validy Technology solves the problems of trustworthiness and predictable execution that
have been plaguing IT systems for more than 30 years. Like other modern cryptographic algorithms and protocols, Validy
Technology does not rely on any hidden know-how and the innovation is entirely described in the patents. In spite of this
openness, none of the experts who have faced the technology has stated any reservation on the solution's sturdiness neither
for today nor for the future. Thanks to a novel approach of security, Validy Technology allows to easily secure distributed
IT architectures, embedded systems and software. The protected software actively defends itself against attacks. The
notion of external or internal threat has no meaning for Validy Technology, which is not the case for current solutions that
require to define a security perimeter (e.g. firewall, intrusion detection systems, risk managers…) A small but essential
part of the application is executed out of reach (in the security co-processor), the protection departs radically from
software only solutions, common "dongles" or integrity checks performed at program load time. Data and instructions are
not the only hidden elements. Associating an identifier or "tag" with each instruction that defines a value and a list of
expected tags with each use of a value, assertions about the normal control flow of the application can be embedded in the
ciphered instructions. As it verifies these assertions during runtime, the token can detect and thwart most attacks that alter
the flow of instructions coming from the main processor. Attackers wanting to modify the behaviour of an application,
cannot simply “patch” the application. They must understand the hidden elements to implement their changes in a way
that is not detected by the token. The protection is so effective that the difficulty to achieve such a stealthy attack is
extremely high.
IMPLEMENTATION STRATEGY - Our top prospects are: Department of Homeland Security, Boeing, IBM,
Checkpoint, Cisco, SUN, Microsoft, GE, GM, Ford, APC, Westinghouse, Intel, Motorola, HP, Bank of America, PTC,
Oracle, Adobe, ATT, Verizon,… or any company wishing a software assurance for embedded software or for IT systems.
The licensing of Validy Technology will provide to Validy and its partners, revenues of several billions dollars. Validy
will win those customers since Validy Technology insurance of trustworthiness and predictable execution is very effective.
It is a real breakthrough in the security field. Moreover it is simple to deploy and requires no change of architecture.
FINANCING - Validy Net Inc has already raised 9 millions dollars. As of today, 80% of the company is held by its
founders. Validy’s top priority is to license the Validy Technology to the first major reference customers. In addition
Validy Softnaos for C/C++ will also be developed to provide a Reference Implementation for C and C++. To market the
technology worldwide Validy is looking for an additional funding of $ 2 million (USD) and a strategic partnership.
MANAGEMENT SUMMARY - Gilles SGRO, President and CEO, graduated with a master of strategic management.
He also runs as founder with his wife the “Fingerprint Technologies” company, a successful Internet service company
with a revenue of $1 million USD. Jean-Christophe CUE OD, CTO, graduated from “Ecole Normale Supérieure”. He
has worked in one of the best research centers of Silicon Valley: Xerox PARC (Palo Alto Research Center). He was then
team leader for the design of workstations at Digital. The workstations he designed have represented up to 2% of Digital’s
sales. Its work at Digital is very well known by the general public since the bus specifications he made for one of those
workstations have been used by the USB consortium. Christophe VEDEL, graduated from “Ecole Polytechnique”. He is
in charge of software developments and as compiler specialist brings up his exceptional software skills to the Validy team.
CONTACTS
Mr Gilles SGRO - President - Cell: +33 6 84 60 00 96 - Email: gilles.sgro@validy-net.com
Mr Jean-Christophe CUENOD – CTO – Cell: +33 6 71 62 86 15 - Email: jcc@validy-net.com

Más contenido relacionado

La actualidad más candente

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationInfosec
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsIntel IT Center
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Ads n url development process document (1)
Ads n url development process document (1)Ads n url development process document (1)
Ads n url development process document (1)Saumya Sharma
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scalePriyanka Aash
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateInfosec
 
Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security CertificationVskills
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionSymantec
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distributionSantosh Satam
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
The Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogixThe Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogixsalesbuddy
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop Intel® Software
 
Common Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic StandardCommon Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic StandardAmy Nicewick, CISSP, CCSP, CEH
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...Infosec
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 

La actualidad más candente (20)

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Ads n url development process document (1)
Ads n url development process document (1)Ads n url development process document (1)
Ads n url development process document (1)
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security Certification
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distribution
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
The Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogixThe Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogix
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop
 
Common Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic StandardCommon Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic Standard
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 

Destacado

Boletin tributario opt2
Boletin tributario opt2Boletin tributario opt2
Boletin tributario opt2Mely Lovera
 
Trabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativosTrabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativosAnalia Rolla
 
Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)ojitos96
 
Making inferences power point
Making inferences power pointMaking inferences power point
Making inferences power pointbettsyjk
 
Tecnologia de la informacion (1)
Tecnologia de la informacion (1)Tecnologia de la informacion (1)
Tecnologia de la informacion (1)ojitos96
 
Intersections and inequalities day 12
Intersections and inequalities day 12Intersections and inequalities day 12
Intersections and inequalities day 12cirilah
 
Intersections and inequalities day 15
Intersections and inequalities day 15Intersections and inequalities day 15
Intersections and inequalities day 15cirilah
 
Schroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 AssignmentSchroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 AssignmentMariaSchroeter
 
Intersections and inequalities day 11
Intersections and inequalities day 11Intersections and inequalities day 11
Intersections and inequalities day 11cirilah
 
Intersections and inequalities day 14
Intersections and inequalities day 14Intersections and inequalities day 14
Intersections and inequalities day 14cirilah
 
Intersections and inequalities day 13
Intersections and inequalities day 13Intersections and inequalities day 13
Intersections and inequalities day 13cirilah
 

Destacado (20)

Pry feria
Pry feriaPry feria
Pry feria
 
Boletin tributario opt2
Boletin tributario opt2Boletin tributario opt2
Boletin tributario opt2
 
7 pasos para mejorar la memoria
7 pasos para mejorar la memoria7 pasos para mejorar la memoria
7 pasos para mejorar la memoria
 
Computer technology
Computer technologyComputer technology
Computer technology
 
презентация компании GEOshop
презентация компании GEOshopпрезентация компании GEOshop
презентация компании GEOshop
 
Trabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativosTrabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativos
 
Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)
 
Question 3
Question 3Question 3
Question 3
 
Making inferences power point
Making inferences power pointMaking inferences power point
Making inferences power point
 
Tecnologia de la informacion (1)
Tecnologia de la informacion (1)Tecnologia de la informacion (1)
Tecnologia de la informacion (1)
 
Intersections and inequalities day 12
Intersections and inequalities day 12Intersections and inequalities day 12
Intersections and inequalities day 12
 
APRENDIZAJE COLABORATIVO
APRENDIZAJE COLABORATIVOAPRENDIZAJE COLABORATIVO
APRENDIZAJE COLABORATIVO
 
Intersections and inequalities day 15
Intersections and inequalities day 15Intersections and inequalities day 15
Intersections and inequalities day 15
 
Schroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 AssignmentSchroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 Assignment
 
Diploma_Supplement
Diploma_SupplementDiploma_Supplement
Diploma_Supplement
 
Amor verdadero
Amor verdaderoAmor verdadero
Amor verdadero
 
Intersections and inequalities day 11
Intersections and inequalities day 11Intersections and inequalities day 11
Intersections and inequalities day 11
 
Intersections and inequalities day 14
Intersections and inequalities day 14Intersections and inequalities day 14
Intersections and inequalities day 14
 
Intersections and inequalities day 13
Intersections and inequalities day 13Intersections and inequalities day 13
Intersections and inequalities day 13
 
Trabajo power point de televisión ii
Trabajo power point de televisión iiTrabajo power point de televisión ii
Trabajo power point de televisión ii
 

Similar a Validy netinc nsa_ops1_ops2_executive summary

GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxlisandrai1k
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Importance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best PracticesImportance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best PracticesElanusTechnologies
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfSavinder Puri
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Comguard expanding-portfolio
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolioxband
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Corporation
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Corporation
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfNathanDjami
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 

Similar a Validy netinc nsa_ops1_ops2_executive summary (20)

Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Importance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best PracticesImportance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best Practices
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Comguard expanding-portfolio
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolio
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 

Más de Gilles Sgro

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013Gilles Sgro
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013Gilles Sgro
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013Gilles Sgro
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiGilles Sgro
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyGilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Gilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Gilles Sgro
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012Gilles Sgro
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...Gilles Sgro
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012Gilles Sgro
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueGilles Sgro
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012Gilles Sgro
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Gilles Sgro
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012Gilles Sgro
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandGilles Sgro
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013Gilles Sgro
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013Gilles Sgro
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...Gilles Sgro
 

Más de Gilles Sgro (20)

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchi
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosy
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marland
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
 

Último

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Validy netinc nsa_ops1_ops2_executive summary

  • 1. Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078 __________________________________________________________________________________________ __________________________________________________________________________________________ 1/2 OVERVIEW - Validy licenses a breakthrough Software Assurance technology, called “Validy Technology”, ensuring both software trustworthiness and predictable execution. Validy Technology achieves protection by combining software code transformations with a piece of secure hardware, behaving as a co-processor. It is independent of Operating Systems and is able to secure embedded systems as well as traditional computer programs. Validy addresses global markets: from automobiles to banking systems, from aeronautics to telecommunication networks from computing equipments to consumer electronics. Validy Technology is the result of 9 years of R&D. Validy has been granted 10 patents and is extending them in more than 50 countries. Given the numerous market segments encompassed by the technology, Validy has chosen a business model based on Licensing. Validy Technology’s key differentiation from competition consists in its ability to ensure by itself the integrity of software during execution, without any third-party help. Thus it can be viewed as the new self-defense solution for electronic and IT equipments. MARKET HIGHLIGHTS - Validy addresses global markets: Homeland Security to banking systems, aeronautics to telecommunication networks, computing equipments to consumer electronics. Today, the company is focusing on the protection of Energy etwork Distribution (SCADA), embedded software in cars and embedded software in mobile phones. A strategic target in those markets consists in securing security software programs: Those programs, more than any others, must be able to run correctly without being diverted from their normal behavior by pirates. Validy is also taking particular care of the embedded systems market for which Validy Technology is a definitive answer to ensure justifiable confidence in the field. TECHNOLOGY - Validy Technology protects software against sabotage, cyber-criminality, cyber-terrorism and is a basic building block for Software Assurance. Any program protected by Validy Technology continuously checks its own integrity while running and takes reprisals if any problem is detected (Detection and Coercion patent). Validy Technology’s mutual check mechanism even extends the protection to distributed architectures. For instance, a client is protected by its server and a server is protected by its clients. To put into place the protection of a program, the developer needs to compile it with the Validy post-compiler. While running, the secure co-processor becomes an extension of the main processor and provides the protection. The update of an existing program using the Validy protection is very simple: The developer has to use the same parameters when running the post-compiler and the existing co-processors will run with the "new" program. Depending on the application, the co-processor can be housed under various form-factors: USB Key, Surface Mount Chip, SIM, … There is no need to change the architecture to add protection. Developers can continue to use their usual development tool. REFERENCE IMPLEMENTATION - In order to offer a working example to licensees, Validy has developed “Validy Soft aos for Java”, a Reference Implementation of Validy Technology using a co-processor housed inside a USB token. Since the technology doesn’t rely on any secret information, Validy Soft aos for Java not only shows a possible implementation of the technology but is at the same time a real product providing great protection against piracy (illegal software copy). Given this capability, it can be used by software publishers who develop Java applications and we market it as such. The Validy SoftNaos USB Token EXAMPLES - Validy technology is able to efficiently secure Electric Distribution etwork by protecting Supervisory Control And data Acquisition (SCADA) software as well as software embedded in electric equipments involved in electric distribution. The protection is really effective because Validy Technology protects software during its execution. This feature is particularly important for high availability systems and high criticity systems like electric distribution. The protection is simple to deploy. During upgrades, there is no need to change the Validy co-processor protecting the software embedded in electric equipments on the field: the instructions aren’t stored in the co-processor but are directly EXECUTIVE SUMMARY
  • 2. Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078 __________________________________________________________________________________________ __________________________________________________________________________________________ 2/2 sent to the coprocessor on the fly during execution. Electric Distribution companies will find a cheap and efficient solution to protect their electric distribution network from cyber-criminality and cyber-terrorism. Validy technology is able to efficiently secure embedded software in cars. As soon as a piece of software is detected as corrupted, the retaliation countermeasure keeps the behavior of the car safe for the driver. Car manufacturers will appreciate this solution to guarantee the safety of their cars. Validy Technology is able to secure embedded software in a smartphones. With Validy Technology, the user will not be able to jailbreak his smartphone. Phone manufacturer or telecom companies will appreciate this feature to guarantee their business model. Validy’s technology has a strong differentiation from the solution of competitors like TPM module because it is easier to use and really more secure ensuring the security of the software during its execution. COMPETITIVE EDGE - Validy Technology solves the problems of trustworthiness and predictable execution that have been plaguing IT systems for more than 30 years. Like other modern cryptographic algorithms and protocols, Validy Technology does not rely on any hidden know-how and the innovation is entirely described in the patents. In spite of this openness, none of the experts who have faced the technology has stated any reservation on the solution's sturdiness neither for today nor for the future. Thanks to a novel approach of security, Validy Technology allows to easily secure distributed IT architectures, embedded systems and software. The protected software actively defends itself against attacks. The notion of external or internal threat has no meaning for Validy Technology, which is not the case for current solutions that require to define a security perimeter (e.g. firewall, intrusion detection systems, risk managers…) A small but essential part of the application is executed out of reach (in the security co-processor), the protection departs radically from software only solutions, common "dongles" or integrity checks performed at program load time. Data and instructions are not the only hidden elements. Associating an identifier or "tag" with each instruction that defines a value and a list of expected tags with each use of a value, assertions about the normal control flow of the application can be embedded in the ciphered instructions. As it verifies these assertions during runtime, the token can detect and thwart most attacks that alter the flow of instructions coming from the main processor. Attackers wanting to modify the behaviour of an application, cannot simply “patch” the application. They must understand the hidden elements to implement their changes in a way that is not detected by the token. The protection is so effective that the difficulty to achieve such a stealthy attack is extremely high. IMPLEMENTATION STRATEGY - Our top prospects are: Department of Homeland Security, Boeing, IBM, Checkpoint, Cisco, SUN, Microsoft, GE, GM, Ford, APC, Westinghouse, Intel, Motorola, HP, Bank of America, PTC, Oracle, Adobe, ATT, Verizon,… or any company wishing a software assurance for embedded software or for IT systems. The licensing of Validy Technology will provide to Validy and its partners, revenues of several billions dollars. Validy will win those customers since Validy Technology insurance of trustworthiness and predictable execution is very effective. It is a real breakthrough in the security field. Moreover it is simple to deploy and requires no change of architecture. FINANCING - Validy Net Inc has already raised 9 millions dollars. As of today, 80% of the company is held by its founders. Validy’s top priority is to license the Validy Technology to the first major reference customers. In addition Validy Softnaos for C/C++ will also be developed to provide a Reference Implementation for C and C++. To market the technology worldwide Validy is looking for an additional funding of $ 2 million (USD) and a strategic partnership. MANAGEMENT SUMMARY - Gilles SGRO, President and CEO, graduated with a master of strategic management. He also runs as founder with his wife the “Fingerprint Technologies” company, a successful Internet service company with a revenue of $1 million USD. Jean-Christophe CUE OD, CTO, graduated from “Ecole Normale Supérieure”. He has worked in one of the best research centers of Silicon Valley: Xerox PARC (Palo Alto Research Center). He was then team leader for the design of workstations at Digital. The workstations he designed have represented up to 2% of Digital’s sales. Its work at Digital is very well known by the general public since the bus specifications he made for one of those workstations have been used by the USB consortium. Christophe VEDEL, graduated from “Ecole Polytechnique”. He is in charge of software developments and as compiler specialist brings up his exceptional software skills to the Validy team. CONTACTS Mr Gilles SGRO - President - Cell: +33 6 84 60 00 96 - Email: gilles.sgro@validy-net.com Mr Jean-Christophe CUENOD – CTO – Cell: +33 6 71 62 86 15 - Email: jcc@validy-net.com