Comae Technologies is a privately-owned, elite grade cybersecurity firm that diagnoses, prevents and recovers organizations (government and private sector) from cyber attacks. Founded in 2016 by Matt Suiche, the company is headquartered in the United Arab Emirates, one of the most exciting cities of the new world. Comae is also recognized by the financial industry as one of the pioneer companies in the field of Blockchain Security.
The Comae Service Portfolio
Comae partners with top tier enterprises to protect their clients, employees and stakeholders against cyber-threats and helps assess the security of their products to find flaws and vulnerabilities before attackers do. Services include Application Security, Reverse Engineering, Penetration Testing, Digital Forensics and Incident Response and Advising.
Stardust by Comae
The Comae Stardust platform provides innovative and scalable memory forensics capabilities as a cloud-based web service. This allows organizations of all types to execute quick and comprehensive security assessments in order to serve forensic and incident response needs. Its memory toolkit has thousands of users across the globe, including government agencies and Fortune 500 companies.
Comae Labs was created to tackle emerging and unexplored security issues via reverse engineering. Its first release relates to blockchain security, through its “Porosity Framework” which allows unprecedented analysis of smart contracts.
OPCDE Security Conference
OPCDE is the first purely technical security conference serving the Middle East, which aims to cultivate the regional security industry via bringing leading the best security researchers in the World
Matt SuicheFounder & Managing Director, email@example.com
Matt Suiche is the founder of the cybersecurity start-up Comae Technologies. Prior to founding Comae, he was the Co-Founder and Chief Scientist of the application virtualization start-up CloudVolumes which was acquired by VMware in 2014.
Matt has also been a frequent speaker at various computer security conferences such as Black Hat Briefings, Microsoft Blue Hat Hacker Conference, Hackito Ergo Sum, Europol High Tech Crime Experts Meeting, CanSecWest, PacSec, Hack In, The Box, SyScan and Shakacon
The GrugqVP of Threat Intelligence, firstname.lastname@example.org
The Grugq is a pioneering information security researcher with two decades of experience. He has worked extensively with threat intelligence, digital forensic analysis, binary reverse engineering, rootkits, mobile phone security, Voice over IP, telecommunications and financial services security.
The Grugq’s professional career has included Fortune 100 companies, leading information security firms and innovative start-ups. Since 2002 the Grugq has spoken, or delivered keynotes, at at least one conference every year including BlackHat, Hack in the Box, SyScan, TROOPERS, Power of Community, Ruxcon, and dozens more; provided expert training courses to .gov, .mil, police, individuals and businesses; domain expertise on threat intelligence, mobile phone security, operational security, privacy, digital forensics, voip, telecommunications and financial systems.
Andrey BazhanSoftware Engineer, email@example.com
Andrey Bazhan is a Windows Software Development and Debug Engineer. In 2011, after a few years of studying Windows Operating Systems as an enthusiast, he got certified by Microsoft and became Microsoft Certified Technology Specialist in Windows Internals.
As a software engineer he developed a few programs for advanced troubleshooting and exploring Windows Internals. His the most known project is DbgKit, which is the first GUI extension for Debugging Tools for Windows (WinDbg, KD, CDB, NTSD). As a debug engineer he found the root cause of failure in software products such as Windows 8/8.1, Visual Studio, Team Foundation Server, Debugging Tools for Windows and Sysinternals