SlideShare a Scribd company logo
1 of 2
Download to read offline
Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078
__________________________________________________________________________________________
__________________________________________________________________________________________
1/2
OVERVIEW - Validy licenses a breakthrough Software Assurance technology, called “Validy Technology”, ensuring
both software trustworthiness and predictable execution. Validy Technology achieves protection by combining software
code transformations with a piece of secure hardware, behaving as a co-processor. It is independent of Operating Systems
and is able to secure embedded systems as well as traditional computer programs. Validy addresses global markets: from
automobiles to banking systems, from aeronautics to telecommunication networks from computing equipments to
consumer electronics. Validy Technology is the result of 9 years of R&D. Validy has been granted 10 patents and is
extending them in more than 50 countries. Given the numerous market segments encompassed by the technology, Validy
has chosen a business model based on Licensing. Validy Technology’s key differentiation from competition consists in
its ability to ensure by itself the integrity of software during execution, without any third-party help. Thus it can be
viewed as the new self-defense solution for electronic and IT equipments.
MARKET HIGHLIGHTS - Validy addresses global markets: Homeland Security to banking systems, aeronautics to
telecommunication networks, computing equipments to consumer electronics. Today, the company is focusing on the
protection of Energy etwork Distribution (SCADA), embedded software in cars and embedded software in
mobile phones. A strategic target in those markets consists in securing security software programs: Those programs,
more than any others, must be able to run correctly without being diverted from their normal behavior by pirates. Validy is
also taking particular care of the embedded systems market for which Validy Technology is a definitive answer to ensure
justifiable confidence in the field.
TECHNOLOGY - Validy Technology protects software against sabotage, cyber-criminality, cyber-terrorism and
is a basic building block for Software Assurance. Any program protected by Validy Technology continuously checks its
own integrity while running and takes reprisals if any problem is detected (Detection and Coercion patent). Validy
Technology’s mutual check mechanism even extends the protection to distributed architectures. For instance, a client is
protected by its server and a server is protected by its clients. To put into place the protection of a program, the developer
needs to compile it with the Validy post-compiler. While running, the secure co-processor becomes an extension of the
main processor and provides the protection. The update of an existing program using the Validy protection is very simple:
The developer has to use the same parameters when running the post-compiler and the existing co-processors will run
with the "new" program. Depending on the application, the co-processor can be housed under various form-factors: USB
Key, Surface Mount Chip, SIM, … There is no need to change the architecture to add protection. Developers can continue
to use their usual development tool.
REFERENCE IMPLEMENTATION - In order to offer a working example to licensees, Validy has developed
“Validy Soft aos for Java”, a Reference Implementation of Validy Technology using a co-processor housed inside a USB
token. Since the technology doesn’t rely on any secret information, Validy Soft aos for Java not only shows a possible
implementation of the technology but is at the same time a real product providing great protection against piracy (illegal
software copy). Given this capability, it can be used by software publishers who develop Java applications and we market
it as such.
The Validy SoftNaos USB Token
EXAMPLES - Validy technology is able to efficiently secure Electric Distribution etwork by protecting Supervisory
Control And data Acquisition (SCADA) software as well as software embedded in electric equipments involved in
electric distribution. The protection is really effective because Validy Technology protects software during its execution.
This feature is particularly important for high availability systems and high criticity systems like electric distribution. The
protection is simple to deploy. During upgrades, there is no need to change the Validy co-processor protecting the
software embedded in electric equipments on the field: the instructions aren’t stored in the co-processor but are directly
EXECUTIVE SUMMARY
Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078
__________________________________________________________________________________________
__________________________________________________________________________________________
2/2
sent to the coprocessor on the fly during execution. Electric Distribution companies will find a cheap and efficient
solution to protect their electric distribution network from cyber-criminality and cyber-terrorism.
Validy technology is able to efficiently secure embedded software in cars. As soon as a piece of software is detected as
corrupted, the retaliation countermeasure keeps the behavior of the car safe for the driver. Car manufacturers will
appreciate this solution to guarantee the safety of their cars.
Validy Technology is able to secure embedded software in a smartphones. With Validy Technology, the user will not be
able to jailbreak his smartphone. Phone manufacturer or telecom companies will appreciate this feature to guarantee their
business model.
Validy’s technology has a strong differentiation from the solution of competitors like TPM module because it is easier to
use and really more secure ensuring the security of the software during its execution.
COMPETITIVE EDGE - Validy Technology solves the problems of trustworthiness and predictable execution that
have been plaguing IT systems for more than 30 years. Like other modern cryptographic algorithms and protocols, Validy
Technology does not rely on any hidden know-how and the innovation is entirely described in the patents. In spite of this
openness, none of the experts who have faced the technology has stated any reservation on the solution's sturdiness neither
for today nor for the future. Thanks to a novel approach of security, Validy Technology allows to easily secure distributed
IT architectures, embedded systems and software. The protected software actively defends itself against attacks. The
notion of external or internal threat has no meaning for Validy Technology, which is not the case for current solutions that
require to define a security perimeter (e.g. firewall, intrusion detection systems, risk managers…) A small but essential
part of the application is executed out of reach (in the security co-processor), the protection departs radically from
software only solutions, common "dongles" or integrity checks performed at program load time. Data and instructions are
not the only hidden elements. Associating an identifier or "tag" with each instruction that defines a value and a list of
expected tags with each use of a value, assertions about the normal control flow of the application can be embedded in the
ciphered instructions. As it verifies these assertions during runtime, the token can detect and thwart most attacks that alter
the flow of instructions coming from the main processor. Attackers wanting to modify the behaviour of an application,
cannot simply “patch” the application. They must understand the hidden elements to implement their changes in a way
that is not detected by the token. The protection is so effective that the difficulty to achieve such a stealthy attack is
extremely high.
IMPLEMENTATION STRATEGY - Our top prospects are: Department of Homeland Security, Boeing, IBM,
Checkpoint, Cisco, SUN, Microsoft, GE, GM, Ford, APC, Westinghouse, Intel, Motorola, HP, Bank of America, PTC,
Oracle, Adobe, ATT, Verizon,… or any company wishing a software assurance for embedded software or for IT systems.
The licensing of Validy Technology will provide to Validy and its partners, revenues of several billions dollars. Validy
will win those customers since Validy Technology insurance of trustworthiness and predictable execution is very effective.
It is a real breakthrough in the security field. Moreover it is simple to deploy and requires no change of architecture.
FINANCING - Validy Net Inc has already raised 9 millions dollars. As of today, 80% of the company is held by its
founders. Validy’s top priority is to license the Validy Technology to the first major reference customers. In addition
Validy Softnaos for C/C++ will also be developed to provide a Reference Implementation for C and C++. To market the
technology worldwide Validy is looking for an additional funding of $ 2 million (USD) and a strategic partnership.
MANAGEMENT SUMMARY - Gilles SGRO, President and CEO, graduated with a master of strategic management.
He also runs as founder with his wife the “Fingerprint Technologies” company, a successful Internet service company
with a revenue of $1 million USD. Jean-Christophe CUE OD, CTO, graduated from “Ecole Normale Supérieure”. He
has worked in one of the best research centers of Silicon Valley: Xerox PARC (Palo Alto Research Center). He was then
team leader for the design of workstations at Digital. The workstations he designed have represented up to 2% of Digital’s
sales. Its work at Digital is very well known by the general public since the bus specifications he made for one of those
workstations have been used by the USB consortium. Christophe VEDEL, graduated from “Ecole Polytechnique”. He is
in charge of software developments and as compiler specialist brings up his exceptional software skills to the Validy team.
CONTACTS
Mr Gilles SGRO - President - Cell: +33 6 84 60 00 96 - Email: gilles.sgro@validy-net.com
Mr Jean-Christophe CUENOD – CTO – Cell: +33 6 71 62 86 15 - Email: jcc@validy-net.com

More Related Content

What's hot

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationInfosec
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsIntel IT Center
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowInfosec
 
Ads n url development process document (1)
Ads n url development process document (1)Ads n url development process document (1)
Ads n url development process document (1)Saumya Sharma
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scalePriyanka Aash
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateInfosec
 
Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security CertificationVskills
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionSymantec
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distributionSantosh Satam
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSSprintzeal
 
The Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogixThe Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogixsalesbuddy
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop Intel® Software
 
Common Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic StandardCommon Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic StandardAmy Nicewick, CISSP, CCSP, CEH
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...Infosec
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 

What's hot (20)

Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
CSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoatCSSLP & OWASP & WebGoat
CSSLP & OWASP & WebGoat
 
CMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organizationCMMC rollout: How CMMC will impact your organization
CMMC rollout: How CMMC will impact your organization
 
Accelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform BenefitsAccelerating Our Path to Multi Platform Benefits
Accelerating Our Path to Multi Platform Benefits
 
CompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to knowCompTIA cysa+ certification changes: Everything you need to know
CompTIA cysa+ certification changes: Everything you need to know
 
Ads n url development process document (1)
Ads n url development process document (1)Ads n url development process document (1)
Ads n url development process document (1)
 
A successful application security program - Envision build and scale
A successful application security program - Envision build and scaleA successful application security program - Envision build and scale
A successful application security program - Envision build and scale
 
CompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 updateCompTIA Security+: Everything you need to know about the SY0-601 update
CompTIA Security+: Everything you need to know about the SY0-601 update
 
Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security Certification
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
how to secure web applications with owasp - isaca sep 2009 - for distribution
how to secure web applications  with owasp - isaca sep 2009 - for distributionhow to secure web applications  with owasp - isaca sep 2009 - for distribution
how to secure web applications with owasp - isaca sep 2009 - for distribution
 
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONSCYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
CYBER SECURITY ANALYST - HOW TO BECOME, JOB DEMAND AND TOP CERTIFICATIONS
 
The Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogixThe Future of PLC Programming by WonderLogix
The Future of PLC Programming by WonderLogix
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop Microsoft Build 2019- Intel AI Workshop
Microsoft Build 2019- Intel AI Workshop
 
Common Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic StandardCommon Criteria and a Mutually-Recognized International Cryptographic Standard
Common Criteria and a Mutually-Recognized International Cryptographic Standard
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based...
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 

Viewers also liked

Boletin tributario opt2
Boletin tributario opt2Boletin tributario opt2
Boletin tributario opt2Mely Lovera
 
Trabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativosTrabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativosAnalia Rolla
 
Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)ojitos96
 
Making inferences power point
Making inferences power pointMaking inferences power point
Making inferences power pointbettsyjk
 
Tecnologia de la informacion (1)
Tecnologia de la informacion (1)Tecnologia de la informacion (1)
Tecnologia de la informacion (1)ojitos96
 
Intersections and inequalities day 12
Intersections and inequalities day 12Intersections and inequalities day 12
Intersections and inequalities day 12cirilah
 
Intersections and inequalities day 15
Intersections and inequalities day 15Intersections and inequalities day 15
Intersections and inequalities day 15cirilah
 
Schroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 AssignmentSchroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 AssignmentMariaSchroeter
 
Intersections and inequalities day 11
Intersections and inequalities day 11Intersections and inequalities day 11
Intersections and inequalities day 11cirilah
 
Intersections and inequalities day 14
Intersections and inequalities day 14Intersections and inequalities day 14
Intersections and inequalities day 14cirilah
 
Intersections and inequalities day 13
Intersections and inequalities day 13Intersections and inequalities day 13
Intersections and inequalities day 13cirilah
 

Viewers also liked (20)

Pry feria
Pry feriaPry feria
Pry feria
 
Boletin tributario opt2
Boletin tributario opt2Boletin tributario opt2
Boletin tributario opt2
 
7 pasos para mejorar la memoria
7 pasos para mejorar la memoria7 pasos para mejorar la memoria
7 pasos para mejorar la memoria
 
Computer technology
Computer technologyComputer technology
Computer technology
 
презентация компании GEOshop
презентация компании GEOshopпрезентация компании GEOshop
презентация компании GEOshop
 
Trabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativosTrabajo final rossi y rolla.Redes sociales como entornos educativos
Trabajo final rossi y rolla.Redes sociales como entornos educativos
 
Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)Ojeda estrada zurishaday (la nube)
Ojeda estrada zurishaday (la nube)
 
Question 3
Question 3Question 3
Question 3
 
Making inferences power point
Making inferences power pointMaking inferences power point
Making inferences power point
 
Tecnologia de la informacion (1)
Tecnologia de la informacion (1)Tecnologia de la informacion (1)
Tecnologia de la informacion (1)
 
Intersections and inequalities day 12
Intersections and inequalities day 12Intersections and inequalities day 12
Intersections and inequalities day 12
 
APRENDIZAJE COLABORATIVO
APRENDIZAJE COLABORATIVOAPRENDIZAJE COLABORATIVO
APRENDIZAJE COLABORATIVO
 
Intersections and inequalities day 15
Intersections and inequalities day 15Intersections and inequalities day 15
Intersections and inequalities day 15
 
Schroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 AssignmentSchroeter Tech Tools for Teachers LIS 557 Assignment
Schroeter Tech Tools for Teachers LIS 557 Assignment
 
Diploma_Supplement
Diploma_SupplementDiploma_Supplement
Diploma_Supplement
 
Amor verdadero
Amor verdaderoAmor verdadero
Amor verdadero
 
Intersections and inequalities day 11
Intersections and inequalities day 11Intersections and inequalities day 11
Intersections and inequalities day 11
 
Intersections and inequalities day 14
Intersections and inequalities day 14Intersections and inequalities day 14
Intersections and inequalities day 14
 
Intersections and inequalities day 13
Intersections and inequalities day 13Intersections and inequalities day 13
Intersections and inequalities day 13
 
Trabajo power point de televisión ii
Trabajo power point de televisión iiTrabajo power point de televisión ii
Trabajo power point de televisión ii
 

Similar to Validy netinc nsa_ops1_ops2_executive summary

GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxlisandrai1k
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsFrederic Roy-Gobeil, CPA, CGA, M.Tax.
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
Importance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best PracticesImportance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best PracticesElanusTechnologies
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfSavinder Puri
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Comguard expanding-portfolio
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolioxband
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Corporation
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Corporation
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfNathanDjami
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityCygnet Infotech
 

Similar to Validy netinc nsa_ops1_ops2_executive summary (20)

Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docxAppendix AOperating ScenarioGPSCDU Project for Wild B.docx
Appendix AOperating ScenarioGPSCDU Project for Wild B.docx
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
Importance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best PracticesImportance of Secure Coding with it’s Best Practices
Importance of Secure Coding with it’s Best Practices
 
The Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdfThe Challenge of Integrating Security Solutions with CI.pdf
The Challenge of Integrating Security Solutions with CI.pdf
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Comguard expanding-portfolio
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolio
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 

More from Gilles Sgro

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013Gilles Sgro
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013Gilles Sgro
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013Gilles Sgro
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiGilles Sgro
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyGilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Gilles Sgro
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Gilles Sgro
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012Gilles Sgro
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...Gilles Sgro
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012Gilles Sgro
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueGilles Sgro
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012Gilles Sgro
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012Gilles Sgro
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Gilles Sgro
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012Gilles Sgro
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandGilles Sgro
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013Gilles Sgro
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013Gilles Sgro
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...Gilles Sgro
 

More from Gilles Sgro (20)

Pierre moscovici 13 nov 2013
Pierre moscovici  13 nov 2013Pierre moscovici  13 nov 2013
Pierre moscovici 13 nov 2013
 
Fleur pellerin 13 nov 2013
Fleur pellerin  13 nov 2013Fleur pellerin  13 nov 2013
Fleur pellerin 13 nov 2013
 
Patrick pailloux anssi -3 nov 2013
Patrick pailloux   anssi -3 nov 2013Patrick pailloux   anssi -3 nov 2013
Patrick pailloux anssi -3 nov 2013
 
Courrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchiCourrier embassade de etats unis m. defranchi
Courrier embassade de etats unis m. defranchi
 
Réponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosyRéponse chef de cabinet nicolas sarkosy
Réponse chef de cabinet nicolas sarkosy
 
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
Validy lettre-dpsd-colonel-bourguignon-27-dec-2006
 
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
Validy lettre-dpsd-colonel-bourguignon-15-fev-2007
 
Reponse claude gueant à gilles sgro 9 fev 2012
Reponse claude gueant à gilles sgro   9 fev 2012Reponse claude gueant à gilles sgro   9 fev 2012
Reponse claude gueant à gilles sgro 9 fev 2012
 
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...Validy   171 signataires lettre au président, aux députés, aux sénateurs et à...
Validy 171 signataires lettre au président, aux députés, aux sénateurs et à...
 
Courrier du chef de cabinet du président de la république du 8 aout 2012
Courrier du chef de cabinet du président de la république  du 8 aout 2012Courrier du chef de cabinet du président de la république  du 8 aout 2012
Courrier du chef de cabinet du président de la république du 8 aout 2012
 
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la républiqueLettre recue le 9 nov 2012 du chef de cabinet du président de la république
Lettre recue le 9 nov 2012 du chef de cabinet du président de la république
 
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012Lettre recue fleur pellerin   14 sept 2012 - recu le 1 er octobre 2012
Lettre recue fleur pellerin 14 sept 2012 - recu le 1 er octobre 2012
 
Secrétaire général elyséee macron - lettre - 4 octobre 2012
Secrétaire général elyséee   macron - lettre - 4 octobre 2012Secrétaire général elyséee   macron - lettre - 4 octobre 2012
Secrétaire général elyséee macron - lettre - 4 octobre 2012
 
Secrétaire général elyséee macron - note -4 octobre 2012
Secrétaire général elyséee  macron - note -4 octobre 2012Secrétaire général elyséee  macron - note -4 octobre 2012
Secrétaire général elyséee macron - note -4 octobre 2012
 
Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006Validy lettre à dpsd 09 octobre-2006
Validy lettre à dpsd 09 octobre-2006
 
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
Rapport senateur bockel surligné  cyber defense - 19 juillet 2012Rapport senateur bockel surligné  cyber defense - 19 juillet 2012
Rapport senateur bockel surligné cyber defense - 19 juillet 2012
 
Validy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marlandValidy ministere-defense-chef de cabinet marland
Validy ministere-defense-chef de cabinet marland
 
Patents portfolio 29 aout 2013
Patents portfolio   29 aout 2013Patents portfolio   29 aout 2013
Patents portfolio 29 aout 2013
 
Portefeuille de brevets 29 aout 2013
Portefeuille de brevets   29 aout 2013Portefeuille de brevets   29 aout 2013
Portefeuille de brevets 29 aout 2013
 
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...Autorité de la concurrence   retrait de la plainte - bruno lasserre - 6 mars ...
Autorité de la concurrence retrait de la plainte - bruno lasserre - 6 mars ...
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Validy netinc nsa_ops1_ops2_executive summary

  • 1. Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078 __________________________________________________________________________________________ __________________________________________________________________________________________ 1/2 OVERVIEW - Validy licenses a breakthrough Software Assurance technology, called “Validy Technology”, ensuring both software trustworthiness and predictable execution. Validy Technology achieves protection by combining software code transformations with a piece of secure hardware, behaving as a co-processor. It is independent of Operating Systems and is able to secure embedded systems as well as traditional computer programs. Validy addresses global markets: from automobiles to banking systems, from aeronautics to telecommunication networks from computing equipments to consumer electronics. Validy Technology is the result of 9 years of R&D. Validy has been granted 10 patents and is extending them in more than 50 countries. Given the numerous market segments encompassed by the technology, Validy has chosen a business model based on Licensing. Validy Technology’s key differentiation from competition consists in its ability to ensure by itself the integrity of software during execution, without any third-party help. Thus it can be viewed as the new self-defense solution for electronic and IT equipments. MARKET HIGHLIGHTS - Validy addresses global markets: Homeland Security to banking systems, aeronautics to telecommunication networks, computing equipments to consumer electronics. Today, the company is focusing on the protection of Energy etwork Distribution (SCADA), embedded software in cars and embedded software in mobile phones. A strategic target in those markets consists in securing security software programs: Those programs, more than any others, must be able to run correctly without being diverted from their normal behavior by pirates. Validy is also taking particular care of the embedded systems market for which Validy Technology is a definitive answer to ensure justifiable confidence in the field. TECHNOLOGY - Validy Technology protects software against sabotage, cyber-criminality, cyber-terrorism and is a basic building block for Software Assurance. Any program protected by Validy Technology continuously checks its own integrity while running and takes reprisals if any problem is detected (Detection and Coercion patent). Validy Technology’s mutual check mechanism even extends the protection to distributed architectures. For instance, a client is protected by its server and a server is protected by its clients. To put into place the protection of a program, the developer needs to compile it with the Validy post-compiler. While running, the secure co-processor becomes an extension of the main processor and provides the protection. The update of an existing program using the Validy protection is very simple: The developer has to use the same parameters when running the post-compiler and the existing co-processors will run with the "new" program. Depending on the application, the co-processor can be housed under various form-factors: USB Key, Surface Mount Chip, SIM, … There is no need to change the architecture to add protection. Developers can continue to use their usual development tool. REFERENCE IMPLEMENTATION - In order to offer a working example to licensees, Validy has developed “Validy Soft aos for Java”, a Reference Implementation of Validy Technology using a co-processor housed inside a USB token. Since the technology doesn’t rely on any secret information, Validy Soft aos for Java not only shows a possible implementation of the technology but is at the same time a real product providing great protection against piracy (illegal software copy). Given this capability, it can be used by software publishers who develop Java applications and we market it as such. The Validy SoftNaos USB Token EXAMPLES - Validy technology is able to efficiently secure Electric Distribution etwork by protecting Supervisory Control And data Acquisition (SCADA) software as well as software embedded in electric equipments involved in electric distribution. The protection is really effective because Validy Technology protects software during its execution. This feature is particularly important for high availability systems and high criticity systems like electric distribution. The protection is simple to deploy. During upgrades, there is no need to change the Validy co-processor protecting the software embedded in electric equipments on the field: the instructions aren’t stored in the co-processor but are directly EXECUTIVE SUMMARY
  • 2. Validy Net Inc , 1001 SW Fifth Avenue – Suite 1100, Portland, Oregon 97204 – USA – www.validy-net.com – Tel: (503) 535 8078 __________________________________________________________________________________________ __________________________________________________________________________________________ 2/2 sent to the coprocessor on the fly during execution. Electric Distribution companies will find a cheap and efficient solution to protect their electric distribution network from cyber-criminality and cyber-terrorism. Validy technology is able to efficiently secure embedded software in cars. As soon as a piece of software is detected as corrupted, the retaliation countermeasure keeps the behavior of the car safe for the driver. Car manufacturers will appreciate this solution to guarantee the safety of their cars. Validy Technology is able to secure embedded software in a smartphones. With Validy Technology, the user will not be able to jailbreak his smartphone. Phone manufacturer or telecom companies will appreciate this feature to guarantee their business model. Validy’s technology has a strong differentiation from the solution of competitors like TPM module because it is easier to use and really more secure ensuring the security of the software during its execution. COMPETITIVE EDGE - Validy Technology solves the problems of trustworthiness and predictable execution that have been plaguing IT systems for more than 30 years. Like other modern cryptographic algorithms and protocols, Validy Technology does not rely on any hidden know-how and the innovation is entirely described in the patents. In spite of this openness, none of the experts who have faced the technology has stated any reservation on the solution's sturdiness neither for today nor for the future. Thanks to a novel approach of security, Validy Technology allows to easily secure distributed IT architectures, embedded systems and software. The protected software actively defends itself against attacks. The notion of external or internal threat has no meaning for Validy Technology, which is not the case for current solutions that require to define a security perimeter (e.g. firewall, intrusion detection systems, risk managers…) A small but essential part of the application is executed out of reach (in the security co-processor), the protection departs radically from software only solutions, common "dongles" or integrity checks performed at program load time. Data and instructions are not the only hidden elements. Associating an identifier or "tag" with each instruction that defines a value and a list of expected tags with each use of a value, assertions about the normal control flow of the application can be embedded in the ciphered instructions. As it verifies these assertions during runtime, the token can detect and thwart most attacks that alter the flow of instructions coming from the main processor. Attackers wanting to modify the behaviour of an application, cannot simply “patch” the application. They must understand the hidden elements to implement their changes in a way that is not detected by the token. The protection is so effective that the difficulty to achieve such a stealthy attack is extremely high. IMPLEMENTATION STRATEGY - Our top prospects are: Department of Homeland Security, Boeing, IBM, Checkpoint, Cisco, SUN, Microsoft, GE, GM, Ford, APC, Westinghouse, Intel, Motorola, HP, Bank of America, PTC, Oracle, Adobe, ATT, Verizon,… or any company wishing a software assurance for embedded software or for IT systems. The licensing of Validy Technology will provide to Validy and its partners, revenues of several billions dollars. Validy will win those customers since Validy Technology insurance of trustworthiness and predictable execution is very effective. It is a real breakthrough in the security field. Moreover it is simple to deploy and requires no change of architecture. FINANCING - Validy Net Inc has already raised 9 millions dollars. As of today, 80% of the company is held by its founders. Validy’s top priority is to license the Validy Technology to the first major reference customers. In addition Validy Softnaos for C/C++ will also be developed to provide a Reference Implementation for C and C++. To market the technology worldwide Validy is looking for an additional funding of $ 2 million (USD) and a strategic partnership. MANAGEMENT SUMMARY - Gilles SGRO, President and CEO, graduated with a master of strategic management. He also runs as founder with his wife the “Fingerprint Technologies” company, a successful Internet service company with a revenue of $1 million USD. Jean-Christophe CUE OD, CTO, graduated from “Ecole Normale Supérieure”. He has worked in one of the best research centers of Silicon Valley: Xerox PARC (Palo Alto Research Center). He was then team leader for the design of workstations at Digital. The workstations he designed have represented up to 2% of Digital’s sales. Its work at Digital is very well known by the general public since the bus specifications he made for one of those workstations have been used by the USB consortium. Christophe VEDEL, graduated from “Ecole Polytechnique”. He is in charge of software developments and as compiler specialist brings up his exceptional software skills to the Validy team. CONTACTS Mr Gilles SGRO - President - Cell: +33 6 84 60 00 96 - Email: gilles.sgro@validy-net.com Mr Jean-Christophe CUENOD – CTO – Cell: +33 6 71 62 86 15 - Email: jcc@validy-net.com