|
Corporate Profile
VUPEN is the world leader in vulnerability research for
defensive and offensive security. VUPEN solutions enable
corporations and governments to measure and manage risks,
eliminate vulnerabilities before they can be exploited, and
protect critical infrastructures and assets against known
and unknown vulnerabilities.
VUPEN customers include major corporations (Fortune 500),
worldwide governments, national security agencies, as well as businesses in finance, healthcare,
insurance, manufacturing, and technology.
VUPEN is financially strong, privately held and venture-backed.
Awards & Industry Recognition
In
June 2011, VUPEN has been recognized as "Company of the
Year 2011 in the Vulnerability Research Market" by Frost &
Sullivan.
"VUPEN has made great strides in the vulnerability
research market, proving that it is a top competitor against
competing labs. Frost & Sullivan firmly believes that
VUPEN's dedication and entrepreneurial drive to provide the
highest quality security intelligence to meet the needs of
the current security environment has proven VUPEN as a
reputable and innovative vulnerability research company."
says Frost & Sullivan research analyst Richard Martinez.
 |
In March 2011, VUPEN has participated to and
won the
Pwn2Own security challenge
by discovering and exploiting a critical and previously unknown vulnerability in Apple
Mac OS X Snow Leopard. |
Research Excellence
VUPEN Vulnerability Research Team (VRT) is the most active
security team in the world. Additionally to analyzing and
exploiting recently patched or publicly disclosed flaws, VUPEN
security engineers and researchers are also dedicated to
finding critical and
unpatched vulnerabilities in
prominent and widely deployed software created by Microsoft,
Adobe, Sun, Apple, Oracle, Novell, and others.
VUPEN follows a commercial responsible disclosure policy by
sharing its vulnerability research exclusively with its
customers. VUPEN also reports all discovered vulnerabilities
to the affected vendors under contract with VUPEN, and works
with them to create a timetable pursuant to which the
vulnerability information may be publicly disclosed.
|