Johan Lidros (CISA, CISM, CGEIT, HITRUST CCSFP, ITIL-F, CRISC) has more than 20 years of experience working with financial, healthcare, government and higher education industries in Europe and the US performing IT governance and IT security projects. He has a very comprehensive understanding of current IT governance and security standards such as COBIT, NIST, ISO 38500, ISO31000, HITRUST, ITIL, TIR57 and ISO27000-serie.
Peter Nolin has worked as a application developer for more than 17 years in broad spectra of industries. Specializing in secure coding according to the OWASP framework.
Peter Norin (CISA, CISM) has over 17 years of industry experience as a senior security and system specialist. Peter's skillful approach, background knowledge and experience from working on some of the largest installations in Sweden and US has led to him being considered one of the foremost skilled security professionals in the Nordic region.
Fredrik Soderblom (CISA, CISM) has been working in the IT industry for more than 25 years, and has been involved with the Internet and security since 1992, when he designed and implemented the first firewall for Hewlett Packard in northern Europe. He has designed and implemented various network perimeter security solutions in Europe and the United States, as well as performed numerous security audits.
Willem Stolk (CISM) has more than 18 years of experience of the IT-Industry. Allways with focus of the customer´s business value. He truly believes in forming brilliant teams of brilliant people to make briliant customer solutions. Willem is an experienced IT manager and a project manager with a broad experience of IT-Infrastructure, Information Security and IT-governance.
XPD AB is an independent security consulting and research firm, with a focus on security and perimeter security solutions.
Emineregroup LLC Business Advisor pertaining to Identifying and Managing IT Risks.
Everdon Security AB Focus to help companies and organizations with sensitive security issues related to industrial espionage, information leakage, and cybersecurity.
sysctl is a research and development company in Stockholm, Sweden developing security and cybersecurity products.
WME Konsult AB offers senior consultancy services in several areas, primarily within telecom and mobility, but also through the large network established over the years, able to convey consultants within virtually all IT sectors.
The idea of StoredSafe came from years of security audits where storing passwords, encryption keys and tools to manage these were a common problem in most organizations.
Today it is very common that organizations use tools that are not designed for documenting and managing passwords, such as an excel spreadsheet protected by a password or even plain text files on shared network resources.
It is also quite common to use single user tools for storing passwords. However, these tools are usually protected by a single master password and have no user management, nor any audit capabilities.
The system design was completed in 2010 and our first product, Password StoredSafe, was released in 2011.
The primary objective of Password StoredSafe is to securely store and share passwords as well as critical information related to your passwords on a real need to know basis with a full audit trail.
Our solution ensures that even the system administrators have no access to the critical information and the Information owner owns the master encryption key – The information owner remains in control!
As our customer base grew, we soon understood that the need to store and share critical and highly confidential information, without having to indirectly share it with system administrators and sourcing partners, was a great challenge with current solutions. Based on customer feedback and market research we started to rapidly develop additional products based on our secure platform, to meet the markets need for confidentiality.
Today, we have several products that help our customer to be in compliance with regulatory requirements, departments (IT, Finance, R&D, M&A, etc.) and sourcing vendors to assure confidentiality of critical information. All our solutions are utilizing two-factor authentication and can be integrated into critical systems in a very short time frame and for a low investment.
Our customers represent a wide range of organizations and prove us right when we say that the need for confidentiality and audit capability is needed in most market segments.