What do you get when you cross a Jedi and a Samurai?
Our name captures our identity. Jemurai was founded based on a mission to improve application security by informing, training and arming developers. At Jemurai, we have a sense of duty to developers, and a passion for empowering them to build more secure software.
Our mission is to empower developers and their teams to improve application security. We do this in several ways:
- Close collaboration with software development teams (QA, Product, Business, Development, Security) from project initiation through delivery, with the capacity to take a hands on approach in all phases of the SDLC.
- Development of security tools targeted for the software construction process, with the idea that tools in the hands of developers and teams empower them to understand security and build more secure systems.
- Open education and training resources for developers and end users alike.
Jemurai provides a number of security services, including pure manual security code review, security architecture review, application scanning and testing and can engage with organizations to develop security programs and build security into their SDLC.
For the curious, the name Jemurai is a made up word derived from samurai and jedi. The idea is that both exemplify high skill in battle and at the same time demonstrate strong ideals and ethical standards. Note the defensive and strategic posture of the samurai as opposed to the individual skill and solitude of the ninja. Also, one is from the past, the other the future. This name was chosen to try to capture the core mission and to establish a clear identity.
The founder of Jemurai, Matt Konda, has been building software for more than 15 years, with over 5 years building security software specifically. He was previously a Director and Software Architect in charge of network scanner and penetration test management software at a prominent security company. He frequently gives talks to security and developer audiences to try to advance the understanding of security issues, including Builder Vs. Breaker.