London 2018 Sponsors


Continuum Security

Continuum Security helps you build secure software. Business increasingly trusts software to operate and innovate. As the complexity of this software and the number of potential attackers increases so does the need for robust and secure software.
Our IriusRisk Threat Modeling tool and BDD-Security testing product integrate with existing development processes such as Agile and DevOps so that security is baked in from the start and the resulting software is delivered securely and on time. We are pioneers in “SecDevOps” where security is an integral part of building secure systems, at speed and at scale.


Banco Santander is a leading retail and commercial bank, founded in 1857 and headquartered in Spain. It has a meaningful market share in 10 core markets in Europe and the Americas, and is the largest bank in the euro zone by market capitalization. At the end of June 2018, Banco Santander had 140 million customers, 13,500 branches and 200,000+ employees.



Checkmarx is at the forefront of automated application security testing solutions. The Checkmarx unified platform empowers organizations to deliver secure software faster.
In today’s fast paced development environments, developer adoption is key to security success. The Checkmarx platform integrates seamlessly within the entire development cycle; from concept and through to production, in a developer-friendly manner. Moreover, Checkmarx addresses the developer security skills challenge as part of its offering and delivers digestible secure coding education that ensures developers are not only aware but also proficient in writing secure code. Checkmarx’s mission is ensuring security doesn’t slow down delivery, it enhances it.


Sysdig is the container intelligence company. We have created the only unified platform to deliver monitoring, security, and troubleshooting in a microservices-friendly architecture. Our open source technologies have attracted a community of over a million developers, administrators and other IT professionals looking for deep visibility into systems and containers. Our container intelligence platform monitors and secures millions of containers across hundreds of enterprises, including Fortune 500 companies and web-scale properties.


Veracode, the leading pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from their inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and deploy as well as the components they integrate into their environments.
With its powerful combination of automation, process and speed, Veracode seamlessly integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the lowest-cost point in the development/deployment chain, and blocking threats while in production.

Contrast Security

Most companies build or buy software applications to run their business. Unfortunately, application code exposes critical vulnerabilities to hackers. Contrast solves this complex problem with a bold new secure technology platform that transforms application security by making software self-protecting. Intelligent Contrast agents are injected into the code, instrumenting applications with thousands of smart, agile sensors that detect and correct vulnerabilities before deployment, and protect the software applications in operation. No legacy security tool can protect every web application. But a tenacious army of intelligent Contrast sensors can.



Unomaly automates log data analysis and continuously learns normal behavior for any IT system. This allows IT teams to discover, prevent, explain and resolve incidents, breaches and outages in the IT infrastructure as well as follow changes in the systems. Unomaly has users in 16 countries and in a variety of industries such as finance, energy and betting.


We’re on a Rugged DevOps mission to accelerate software innovation & quality while reducing waste & risk. Ask how you can achieve these goals with Nexus Software Supply Chain solutions: Nexus Repository Manager – your universal repo to manage all binaries, builds, & other deployment assets with toolchain integration. Nexus Firewall & Nexus Lifecycle – empower developers to choose the best component parts from the start with real-time component intelligence, automated policies & ongoing monitoring.


Kiuwan provides enterprises with a collaborative tool that allows teams to work in a blazingly fast environment for application security. It boasts over 4000 proprietary rules & is compliant with all well-known market standards. With support for 20+ programming languages, Kiuwan is at the forefront of application security.

Secure Code Warrior

Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organisation by making security highly visible and providing them with the skills and tools to write secure code from the beginning.

We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and Asia Pacific.



Over 8,000 new security vulnerabilities are discovered every year, more than 20 a day.

Intruder is a continuous perimeter security platform that finds these weaknesses your systems, before the hackers do, and provides simple remediation advice.

We monitor new vulnerabilities as they are released, and provide alerts as soon as you become exposed. We specialise in tailored results to fit the attack surface, so where we see sensitive services like databases exposed to the internet, we’ll make sure you know about it; all while our expert security testers monitor your results, to help find that needle in the haystack.


We work with people and organizations who have ambitious missions – whether they are in the commercial, social or government sectors. We set up smart teams who love challenges and think disruptively to help our clients succeed.

We are focused on helping our industry improve, and believe in sharing what we learn. We do this by writing books, blogging, running events, talking at conferences, and championing open source. We are strong believers in the power of software and technology as tools for social change.


Equal Experts

At Equal Experts we help organisations achieve great things – processing millions of transactions per day in government; building top-5 mobile apps for iOS and Android; launching startups with lean, elegant technology and much, much more.

We’re a community of over 750 experienced consultants (across eight countries, five continents), comprising user researchers, designers, strategic thinkers, product people, BAs, developers, architects, QAs, devops and more – all bound by our shared set of values.

Our network model means experienced, pragmatic people are always invited to join us (even if you’re not looking for an imminent move). Once in the network you’re part of our community, and we’ll keep you informed of new developments and opportunities. When the time is right, we’ll work quickly to find you new challenges – always working with experienced, like-minded practitioners, and helping us achieve even greater things.


Become a DevSecCon sponsor

Showcase your solutions and technologies to decision makers, influencers and users at all levels of IT Security, DevOps and Development as a DevSecCon sponsor.

Contact us

This website uses cookies to ensure you get the best experience on our website More info

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.