CLOs on the Move


 
Libsys is a Naperville, IL-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million
  • www.libsysinc.com
  • 2020 Calamos Ct Ste 200
    Naperville, IL USA 60563
  • Phone: 630.799.1556

Executives

Name Title Contact Details

Similar Companies

Cameron Associates

Cameron Associates is a New York, NY-based company in the Computers and Electronics sector.

Hi-Tek Data Corp

Hi-Tek Data Corp is a Massapequa, NY-based company in the Computers and Electronics sector.

DirectDefense

DirectDefense provides enterprise risk assessments, penetration testing, ICS/SCADA security services, and 24/7 managed security services for companies of all sizes. Focused on building security resiliency, the firm offers comprehensive security testing services with specialization in application security, vulnerability assessments, penetration testing, and compliance assurance testing. Its team of highly talented consultants has worked with the majority of the Fortune 100 companies, in industries such as power and utility, gaming, retail, financial, media, travel, aerospace, healthcare, and technology.

Enlightened

Enlightened is a Washington, DC-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.