CLOs on the Move

Breckenridge Software Tech

www.breckenridgesoftware.com

 
Breckenridge Software Tech is a Wilmington, DE-based company in the Software and Internet sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

SynchSource

SynchSource is a Oakland, CA-based company in the Software and Internet sector.

Esi University at ESI

Esi University at ESI is a Atlanta, GA-based company in the Software and Internet sector.

Rochester Software Associates

Rochester Software Associates, Inc. is a Rochester, NY-based company in the Software & Internet sector.

AlertEnterprise

At AlertEnterprise digital identity and trust are at the center of everything we do and core to our Physical Identity and Access Management (PIAM) solutions. We go to work each day with the mission to help organizations solve critical business and security challenges. We address those challenges by taking a universal digital identity for people and things, extending it across an entire enterprise in a secure, intelligent and efficient way. Fact is, security is long overdue for a digital transformation, and we believe that the changing threat landscape requires a change to conventional thinking and a new approach. This new approach drives us to empower organizations with real-time data insights, so they can do more with less, create engaging employee experiences, increase compliance and reduce risk. Our mission is to bring people, processes, data and technology together in a unique way to help organizations protect what matters most. We call it security convergence. And we develop game-changing security convergence solutions that deliver identity governance, access management, security intelligence and compliance validation across enterprise IT, HR, cyber and physical security environments. AlertEnterprise Inc was formed by the same team who found Virsa Systems which was aquired in 2006 by SAP and named as SAP GRC.

Privacera

Privacera`s enables data democratization without compromising on compliance with data access control, data discovery, and encryption.