| Name | Title | Contact Details |
|---|
Virident Systems is a Milpitas, CA-based company in the Software and Internet sector.
Major Micro Systems Inc is a Southfield, MI-based company in the Software and Internet sector.
When we say, TimeXtender helps companies get business intelligence done, we mean substantially faster than a traditional deployment with stronger efficiency, less time, and less money spent. TimeXtender has been leading the way in Data Warehousing Automation for more than nine years. Our successful track record in helping companies with data warehouse and business intelligence has spread across the globe, and we have become the leader in the Data Warehouse Automation (DWA) for the Microsoft SQL Server market with more than 2,600 customers and various partners worldwide. TimeXtender`s Data Warehousing Automation platform simplifies the data warehouse process and minimizes the time spent on turning complex data into valuable information. Our unique software, TX DWA, brings organizations from any industry results and business reports five times faster than other Business Intelligence solutions on the market.
AutoPower Corporation is a Lake Mary, FL-based company in the Software and Internet sector.
Courion is the market leader in identity and access governance and administration (IGA), from provisioning to governance to identity analytics and intelligence (IAI). In 2015, Courion acquired Core Security to form the only company that can continuously and comprehensively monitor both infrastructure vulnerability and access risk. Core Security provides the industry`s first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and seek to eliminate security threats. Many of the world’s largest enterprises and organizations rely on Courion’s solutions to confidently provide an access governance process that ensures compliance to thousands of employees while protecting critical company data and assets from unauthorized access. Now with the addition of Core Security’s solutions, these same enterprises and security professionals can focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.