Roger thornton fortify software

Digital transformation the movement of critical computing from the datacenter to the cloud is driving rapid changes in business models and network architectures. Top 8 fortify security center alternatives 2020 itqlick. In 2002, roger founded fortify software, convinced that information security required a fundamental shift in thinking from a focus on the. Todays enterprises are built and operated by software that comes from a variety of sources. Over 25 years in the silicon valley and abroad, he has driven the formation and growth of dozens of new companies and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investoradvisor. Meftah previously served as chief products officer at fortify software. Security in all phases of the software development lifecycle.

Richard lee, an independent consultant who just came out of the government. Apr 09, 2009 one of the biggest challenges to implementing a software security assurance program today is management, said roger thornton, cofounder and cto of fortify software. He has driven the formation and growth of dozens of new companies including fortify software and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to investoradvisor. Meftah has over 20 years experience in enterprise software, most recently as vice president of the software security products unit at hp, where he led the fortify and spi dynamics business units after the acquisition of fortify by hp in september 2010. Roger thornton is founder and cto of fortify software.

In this exclusive interview, roger thornton, founder and cto of fortify software, discusses the survey results and his own market perspective, discussing. Feb 24, 2006 roger thornton, cto, fortify software he added that microsoft has developed some 1,099 threat models internally. Now, after 10 years of working with many of the worlds most advanced security organizations at fortify, roger is once again convinced that security needs. Sign up for your own profile on github, the best place to host code, manage projects, and build software alongside 40 million developers. Roger thornton, cto, fortify software he added that microsoft has developed some 1,099 threat models internally. Fortify bundles static and dynamic code analysis visual. See the complete profile on linkedin and discover rogers.

Were pleased that a recognized leader like denim group has become a trusted delivery partner. Click to share on facebook opens in new window click to share on twitter opens in new window. Alienvault cto roger thornton on network visibility on. Fortify s software security assurance products and services protect companies from the threats posed by security flaws in businesscritical software applications. Fortify offerings included static application security testing and dynamic application security testing products, as well as products and. More and more governments and enterprises are using open source. Todays enterprises are built and operated by software that comes from a. The fortify 360 suite is the cornerstone of a new strategy the company calls business software assurance. Prior to alienvault, roger founded fortify software, which was acquired by hp. Aug 19, 2009 fortifys technology brings together the critical analytic, remediation and management capabilities necessary for an effective software security assurance program, said roger thornton, founder and cto of fortify software, inc. He has driven the formation and growth of dozens of new companies including fortify software and hundreds of products, serving in a wide range of roles from engineering, marketing, and management, to. Meanwhile, roger thornton, founder of fortify software, said that although the idea of emergency government powers over computer networks sounds a little unsettling, it isnt alarming given the.

In a statement, fortify cto roger thornton advised businesses to take opensource security seriously. Roger thornton, chief technical officer, alienvault. You might say, well, wait a minute, theres end users and they do stupid things, but were designing software systems and users are part of the system. Software security maturity proving the problem or meeting a basic regulatory requirement fixing security issues uncovered from assessments secure the development. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. Brian chess, mike armistead, roger thornton, ted schlein operating status. At that time, fortify had 4 employees, all founders. Combining deep application security expertise with extensive software development experience, fortify software has defined the market with awardwinning products that assure software. Thats where i fell in love with the whole world of venture and startups. The science of software costpricing may not be easy to understand. I eventually cofounded fortify software in 2002 with a good friend, ted schlein at. Meftah has over 20 years experience in enterprise software, most recently as vice president of the software security products unit at hp, where he led the fortify and spi dynamics business.

Cyber security startup alienvault nabs seven senior hp. Roger thornton, one of the cofounders of fortify, was already involved in the project. In 2002, roger founded fortify software, convinced that information security required a fundamental shift in thinking from a focus on the perimeter to a focus on the core the software code itself. Roger thornton, founder of fortify software, joins prevoty. View roger thorntons profile on linkedin, the worlds largest professional.

Roger thornton is chief technical officer at alienvault llc. Its not just about the technology, but also about bridging the gap between those in the enterprise responsible for development and security, roger thornton, fortifys chief technology officer. Fortifys software security assurance products and services protect companies from the threats posed by security flaws in businesscritical software applications. For information security media group and for fortify software, im tom field. Thornton founded security software company, fortify software, which was acquired by hp in 2010.

I had the incredibly good fortune to grow up in the silicon valley and then went on to spend 20 years there in a variety of professional roles ranging from software engineer and product manager to founder and cto. After intense discussions and negotiations, cigital licensed the sourcescope technology and its associated rules to the kleiner startup that eventually became fortify. Alienvault hires leadership team from hp fortify business wire. Its not just about the technology, but also about bridging the gap between those in the enterprise responsible for development and security, roger thornton, fortify s chief technology officer. View roger thornton s profile on linkedin, the worlds largest professional community. Fortify software security center is a fantastic tool that has a lot to offer, but its important to make sure youre choosing the right security software for your company and its unique needs. Weve been talking with roger thornton, founder and chief technology officer at fortify software. Roger s passion and vision for software security was a catalyst that continues to shape the software security market and was the driving force behind fortify s global leadership. Roger thornton, vp, products and technology alienvault. Companies faulted for shipping flawed software fcw. Fortify security center top competitors and alternatives for 2020. In 2002, roger founded fortify software, convinced that information security required a fundamental shift in thinking from a focus on the perimeter to a focus on. Fortify is targeting developers, who typically are not trained in information security, says roger thornton, cofounder and chief technology officer at fortify, who has led development efforts at etrade financial corp. A new report looks at how secure these collaborative software projects are and what needs.

The company sells information security software tools. Roger thornton, the founder and chief technology officer of fortify software. Davidson college of engineering san jose state university one washington square, san jose, ca 951920080. Rogers career has been dedicated to the development of technology and new business ventures based on technical innovation. He has driven the formation and growth of dozens of new companies including fortify software and hundreds of products, serving in a wide range of roles from. In 2002, roger founded fortify software with a vision to revolutionize information security by shifting focus from the network and endpoints to the weakest link. The topic today is application security, and were talking with roger thornton, founder and chief technology officer with fortify software.

Jul 21, 2008 in a statement, fortify cto roger thornton advised businesses to take opensource security seriously. See the complete profile on linkedin and discover roger s. Denim group partners with fortify software denim group. And im sitting with my good friend, roger thornton, who serves as the chief technical officer for alienvault, which is one of the cooler names of a cyber security company. In that sense, applications security is maturing from a mere testing market into a larger, more continuous process, said roger thornton, chief technology officer at fortify. Rogers passion and vision for software security was a catalyst that continues to shape the software security market and was the driving force behind fortifys global leadership. Fortify security center are offering few flexible plans to their customers, read the article below in order to calculate the total cost of ownership tco which.

Prior to founding fortify software in 2002, he led key development efforts at etrade, guided a major architecture redesign effort at ebay. View roger thorntons profile on linkedin, the worlds largest professional community. Aides defend presidential powers in cybersecurity bill fcw. I eventually co founded fortify software in 2002 with a good friend, ted schlein at kleiner, perkins. One of the biggest challenges to implementing a software security assurance program today is management, said roger thornton, cofounder and cto of fortify software. The models and abuse cases can take many forms as one tries to get into the mind of an attacker and identify all the ways he may attempt to break or exploit the software. The best protection most systems have today is the hope that bad guys are not going to come knock on your door, roger thornton, founder of security firm fortify software windows ce finds its voice. The cyber investing summit is an allday conference focused on the financial opportunities, trends and forecasts in the rapidly growing cybersecurity sector. When comparing fortify security center to their competitors, on a scale between 1 to 10 fortify security center is rated 5. Prior to fortify, he spent ten years working with leading venture capital firms, where he specialized in high impact delivery of technology products and services and helped guide the launch of several successful businesses.

397 1541 719 880 1070 1263 825 45 1269 1061 1061 1013 1413 1197 301 883 1208 743 1261 339 234 24 1177 735 805 1060 301 588 903 443 798 1009 602 66 608 1132 814 1224 681 607 923 401