Contact The Edge360 Team

Edge360_Security Management.jpg
 
 

MEET OUR LEADERSHIP

 
IMG_9139-Edit (1).jpg
 

John Rezzonico | Co-Founder & President

John is also a Marine Corps Veteran. He served as an Intelligence Chief and was previously assigned to the Imagery Interpretation Platoon, conducting imagery analysis in support of the Department of Defense and the Fleet Marine Corps. John supervised, trained, and managed a diverse group of Intelligence Marines and the production of various intelligence products for combat operations during Operation Iraqi Freedom. He served as the Battalion surveillance and reconnaissance asset manager, successfully implementing multiple surveillance systems in a combat environment and worked as the Program Manager on the NSM Surveillance Tactical Surveillance program with the U.S. Army.

 
 
 
IMG_9097-Edit.jpg

Bill MacKrell | Co-Founder & Vice-President

Bill has more than 30 years of business management entrepreneurial experience and has been pivotal in managing all aspects of Edge360’s incubation and growth to date. In addition to being a successful serial entrepreneur, Bill has extensive experience with complex geospatial analysis and visualization systems development for both large and small technology companies. His technical expertise was built through his work on computer graphics and real-time software for flight simulators. He spent a little more than a decade developing simulation tools like Designer’s Workbench, EasyTerrain, and EasyScene for real-time 3D graphics and simulations.

 
 
 
 
 
StickyNoteWeWantYou.png
 
 
 

JOIN THE EDGE360 TEAM

Exciting challenges are ahead. Discover new ways to advance your career and build for the future. Our agile team is strong because we believe in our people; bold innovators, team builders, and thought-provoking ideators.

 

 
 

Customers – Securing Your Environment

Solutions, Services, and Products

Please complete the form below to contact us. Find out how you can secure your environment with enterprise-grade security software and solutions, and of course, our unparalleled support. To learn more about our services and solutions, please explore our website or Subscribe to our weekly content by becoming an Edge360 Insider.

Subscribing to Edge360 Content

Become an Edge360 Insider now and get the latest industry news, perspectives on enterprise security technology, and receive our latest video and blog content.

Product Demo

If you are interested in seeing our technology in action, please go to our Demo page to set up a demo for your environment.


Partners and Suppliers – Work Together to Make the World Safer

Suppliers and Partnership Inquiries

Use the Contact Form below to reach our team if you are interested in engaging with us on an upcoming opportunity. Be sure to use your professional email address in your submission.


Careers – Join Our Team

Please visit our careers page if you are interested in a career with Edge360. We are always excited to receive resumes in our talent pool, but please note that we do not respond to employment inquiries nor do we provide contact information for our employees (past or present).

Accommodation Request
If you are a qualified individual with a disability or are a disabled veteran and are unable or limited in your ability to submit your application via our Careers page as a result of your disability, you have the right to receive assistance. Fill out the form below or give us a call, we are happy to assist.

Technical Assistance
If you are having technical issues with your job application, fill out the form below and our IT team will be in touch with you.


Employees and Alumni – Stay in Touch

Benefits, Address Change, 401(k), and Tax Forms
Please fill out the form below to get in contact with HR if you are an Alumni of Edge360 and need to provide or receive information on benefits, employee information, or tax forms. If you are a current employee, please email HR directly.

Employment Verification
Please fill out the form below if you need an employment verification for an individual who is currently or was previously employed at Edge360. We respect each individual’s privacy and ask that you not send any personally identifiable information via the form below. 


 
 

Contact Form

 
 
 

Edge360 combines proven risk management methodologies and analytics to assess threats and identify vulnerabilities with adaptive security solutions. Our diverse team creates security solutions through tailored physical and information security innovations for the U.S. government, its partners, and commercial enterprises. Edge360’s agile and scalable methodology provides operationally-appropriate, cost-effective, and mission-driven results. Edge360’s security services are offered on a global scale, but headquartered in Ashburn, Virginia.

Enterprise Security Solutions:

·      Physical Security Information Management (PSIM)

·      VMS

·      Data Fusion and Open Source Intelligence Services

·      3D Visualization

 

 

Contact Info

 
 
 
 

Our Office

21660 Red Rum Drive, Suite 105
Ashburn, VA, 20147

Email: info@edge360.com

(571) 748-5562

 
 

Service & Support

(800) 390-5434

 

 

Vulnerability Disclosure Policy

Report any vulnerabilities to Edge360 – security@edge360.com

Introduction

Edge360 is committed to ensuring the security of our users by protecting their information. This policy is intended to
give security researchers clear guidelines for conducting vulnerability discovery activities and to convey our preferences
in how to submit discovered vulnerabilities to us.

This policy describes what systems and types of research are covered under this policy, how to send us vulnerability
reports, and how long we ask security researchers to wait before publicly disclosing vulnerabilities.

We encourage you to contact us to report potential vulnerabilities in our systems.

Authorization

If you make a good faith effort to comply with this policy during your security research, we will consider your research
to be authorized, we will work with you to understand and resolve the issue quickly, and Edge360 will not
recommend or pursue legal action related to your research. Should legal action be initiated by a third party against
you for activities that were conducted in accordance with this policy, we will make this authorization known.

Guidelines

Under this policy, “research” means activities in which you:

  • Notify us as soon as possible after you discover a real or potential security issue.

  • Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems,
    and destruction or manipulation of data.

  • Only use exploits to the extent necessary to confirm a vulnerability’s presence. Do not use an exploit to
    compromise or exfiltrate data, establish command line access and/or persistence, or use the exploit to pivot to
    other systems.

  • Provide us a reasonable amount of time to resolve the issue before you disclose it publicly.

  • Do not submit a high volume of low-quality reports.

    Once you’ve established that a vulnerability exists or encounter any sensitive data (including personally identifiable
    information, financial information, or proprietary information or trade secrets of any party), you must stop your test,
    notify us immediately, and not disclose this data to anyone else.

Test methods

The following test methods are not authorized:

  • Network denial of service (DoS or DDoS) tests or other tests that impair access to or damage a system or data

  • Physical testing (e.g. office access, open doors, tailgating), social engineering (e.g. phishing, vishing), or any other
    non-technical vulnerability testing

  • Full red-team penetration testing that involves unauthorized access to our servers

Scope

This policy applies to the following systems and services:
*.edge360.com
*.surveill.com


Any service not expressly listed above, such as any connected services, are excluded from scope and are not
authorized for testing. Additionally, vulnerabilities found in systems from our vendors fall outside of this policy’s scope
and should be reported directly to the vendor according to their Disclosure Policy (if any). If you aren’t sure whether a
system is in scope or not, contact us at security@edge360.com before starting your research (or at the security contact
for the system’s domain name listed in the .com WHOIS).

Though we develop and maintain other internet-accessible systems or services, we ask that active research and testing
only be conducted on the systems and services covered by the scope of this document. If there is a particular system not
in scope that you think merits testing, please contact us to discuss it first. We will increase the scope of this policy over
time.

Reporting a vulnerability

Information submitted under this policy will be used for defensive purposes only – to mitigate or remediate
vulnerabilities. If your findings include newly discovered vulnerabilities that affect all users of a product or service and not
solely Edge360, we may share your report with the Cybersecurity and Infrastructure Security Agency, where it will be
handled under their coordinated vulnerability disclosure process. We will not share your name or contact information
without express permission.

Coordinated Vulnerability Disclosure Process

Vulnerability reports may be submitted to security@edge360.com. Reports may be submitted anonymously. If you
share contact information, we will acknowledge receipt of your report within 3 business days.

What we would like to see from you

In order to help us triage and prioritize submissions, we recommend that your reports:

  • Describe the location the vulnerability was discovered and the potential impact of exploitation.

  • Offer a detailed description of the steps needed to reproduce the vulnerability (proof of concept scripts or
    screenshots are helpful).

  • Be in English, if possible.

What you can expect from us

When you choose to share your contact information with us, we commit to coordinating with you as openly and as
quickly as possible.

  • Within 3 business days, we will acknowledge that your report has been received.

  • To the best of our ability, we will confirm the existence of the vulnerability to you and be as transparent as
    possible about what steps we are taking during the remediation process, including on issues or challenges that
    may delay resolution.

  • Edge360 does not provide payment to reporters for submitting vulnerabilities.

    • Reporters submitting vulnerabilities to Edge360, in so doing, waive any claims to compensation.

Questions

Questions regarding this policy may be sent to security@edge360.com. We also invite you to contact us with
suggestions for improving this policy.