DevSecCon London 2019 Sponsors




F5 provides the enterprise-level application protection for DDoS mitigation, WAF protection, and access control to keep your apps and their data protected in any cloud environment.
Our security solutions give you visibility and context necessary to adopt the right controls for mitigating the primary risks associated to your applications and your users. For more information, go to You can also follow @f5networks on Twitter or visit us on LinkedIn and Facebook for more information about F5, its partners, and technologies.


Snyk helps companies use open source code and stay secure.
Snyk continuously finds and fixes known vulnerabilities & license violations in open source dependencies, relying on the unique vulnerability database it’s Israeli cyber research team builds.

Going beyond alerts, Snyk fixes discovered issues through proactive pull requests, guided upgrades and hardened patches.

Last but not least, Snyk is designed for and loved by developers and DevOps teams, tightly integrating with source control (e.g. GitHub), elegantly hooking into your CI/CD (e.g. Jenkins) pipelines and continuously monitoring PaaS and Serverless apps in production.



HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. More Fortune 500 and Forbes Global 1000 companies trust HackerOne than any other hacker-powered security alternative. The U.S. Department of Defense, General Motors, Google, Nintendo, Lufthansa, Starbucks, Intel, and over 1,400 other organizations have partnered with HackerOne to find over 120,000 vulnerabilities and award over $55M in bug bounties.


We’re on a Rugged DevOps mission to accelerate software innovation & quality while reducing waste & risk. Ask how you can achieve these goals with Nexus Software Supply Chain solutions: Nexus Repository Manager – your universal repo to manage all binaries, builds, & other deployment assets with toolchain integration. Nexus Firewall & Nexus Lifecycle – empower developers to choose the best component parts from the start with real-time component intelligence, automated policies & ongoing monitoring.

Secure Code Warrior

Secure Code Warrior is a global security company that makes software development better and more secure. Our vision is to empower developers to be the first line of defense in their organisation by making security highly visible and providing them with the skills and tools to write secure code from the beginning.

We have built a powerful platform that moves the focus from reaction to prevention, training and equipping developers to think and act with a security mindset as they build and verify their skills, gain real-time advice and monitor skill development. Our customers include financial institutions, telecommunications providers and global technology companies in Europe, North America and Asia Pacific.


Veracode, the leading pure-play application security vendor in the Gartner Magic Quadrant, delivers the application security solutions and services today’s software-driven world requires. Veracode’s unified platform assesses and improves the security of applications from their inception through production so that businesses can confidently innovate with the web and mobile applications they build, buy and deploy as well as the components they integrate into their environments.

With its powerful combination of automation, process and speed, Veracode seamlessly integrates application security into the software lifecycle, effectively eliminating vulnerabilities during the lowest-cost point in the development/deployment chain, and blocking threats while in production.



Avatao is an online security training platform that offers hands-on training exercises that enable developers to avoid frustrations resulting from security issues. We cover a wide variety of programming languages, software architectures and DevSecOps tools with over 800 exercises. Our customers use our solution to deliver security consciousness to their developers and efficiently build a strong security culture that interweaves the entire tech stack. Developers love Avatao’s interactivity as it allows them to build and break code in real-time, while CISOs love that they can easily measure and track the security skills and progress of their team.

Contrast Security

Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.


Detectify is a SaaS-based web application scanner that automates security tests for 1000+ known vulnerabilities. Founded by top-ranked white hat hackers, Detectify continues to collaborate with the white hat hacker community to crowdsource vulnerability research from the forefront of security. This allows us to go beyond the known CVE libraries that are not a sufficient test bed for modern application security. Detectify integrates into your CI/CD pipeline, enabling teams to scale up security together with product development.

Equal Experts

Equal Experts is a global community of over 1200 experienced consultants, bound together by shared values. Together, we specialise in security – as well as every other discipline required for the delivery of enterprise-level strategy and software.

Equal Experts builds ‘Security as Standard’ into every client engagement, and our dedicated community of practice keeps our consultants tapped into the latest thinking on all things security.


Business increasingly trusts software to operate and innovate. As the complexity of this software and the number of potential attackers increases so does the need for robust and secure software.

With IriusRisk, our Threat Modeling platform that seamlessly integrates with existing development processes such as Agile and DevOps, security is baked in from the start and the resulting software is delivered securely and on time. We are pioneers in “DevSecOps” where security is an integral part of building secure systems, at speed and at scale.  

Become a DevSecCon sponsor

Showcase your solutions and technologies to decision makers, influencers and users at all levels of IT Security, DevOps and Development as a DevSecCon sponsor.

Contact us

This website uses cookies to ensure you get the best experience on our website More info

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Got it!" below then you are consenting to this.