CLOs on the Move

Anomalous Networks

www.anomalousnetworks.com

 
Anomalous Networks is a Dorval, QC-based company in the Software & Internet sector.
  • Number of Employees: 0-25
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Infoway

Infoway LLC is a West Hills, CA-based company in the Software & Internet sector.

Urbanfibre

Urbanfibre exists to superhero every home, business and community across Canada by offering the best broadband experience humanly possible. No more restrictions and complications, just boundless potential and opportunity, accessible for everyone to enjoy. Keepin` it simple We focus on what really matters. That`s why we spend our energy giving you what you really want and delivering it in the simplest, most affordable way possible. That way everybody wins. At the speed of light Our superpower is speed. Our broadband service is the fastest internet available in Canada and it`s our intention to be as responsive as possible to your needs. Superhero at your service We are superheroes at heart. We truly care about the people and the communities we serve. You can expect us to go to great lengths to make you happy, because that`s how superheroes roll. Powering people`s potential We believe that technology plays an important part in powering the potential of humankind. It is through our collective progress that we will discover the solutions the world needs for a better today. For the people We intend to have a net­ positive effect on the people and the communities where we serve. In other words, we exist to do far more good than harm for the people of this planet.

Auersoft

Auersoft is a Mesa, AZ-based company in the Software and Internet sector.

Data Excellency

Data Excellency is a Cerritos, CA-based company in the Software and Internet sector.

Centrify

Centrify is a leader in securing enterprise identities against cyberthreats that target today`s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise`s apps and infrastructure for all its users.