| Name | Title | Contact Details |
|---|
Bayly Communications is a Ajax, ON-based company in the Computers & Electronics sector.
Apex Computer Systems Inc is a Cerritos, CA-based company in the Computers and Electronics sector.
Xactus is the leading verification innovator for the mortgage industry. The company has over 6,500 clients ranging from the largest bank and non-bank mortgage originators to credit unions and mortgage brokers. With 12 operation centers across the U.S., Xactus works closely with its clients to digitally integrate a 360° approach to verification across their workflows. As a result, lenders can easily access the technology necessary to meet consumer demands for a modern mortgage experience with industry-leading speed, reliability, and accuracy – while also closing more loans more quickly with greater profitability
Managed Business Solutions (MBS) is a Colorado Springs, CO-based company in the Computers and Electronics sector.
At Redpoint Cybersecurity, we are constantly interfacing with our affiliates and our customers, who range from individuals across over a dozen industries (including Architecture, Construction, Engineering, Financial Services, Legal, Manufacturing, Private Client Services, and Real Estate) to privately-held companies and government agencies at the state and local levels, in order to better understand their operational and technical risks and to help them optimize their security protocols and practices. Redpoint applies well-established information security methodologies and frameworks, including the CIS Top 20 Critical Controls and the NIST Cybersecurity Framework. 100% of our penetration testers (ethical hackers) are OSCP-certified and possess deep, domain-specific expertise, including network security testing, wireless security testing, web application testing, and mobile device security assessments. In addition to understanding technical hacking techniques, which enables us to approach your company`s environment as an attacker would, we have in-depth experience with the major security frameworks and the development of cyber regulations.