CLOs on the Move

MGA Technologies

www.mgatechnologies.com

 
MGA Technologies is a Clearwater, FL-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

AbleVets

AbleVets LLC is a fast-growing IT consulting and engineering firm, providing advanced IT solutions to improve citizen health, security and services. Our team is highly specialized in applying sophisticated technologies and IT modernization solutions—across cyber security, cloud, and health IT—to help federal and commercial organizations enhance the lives of customers they serve. As a certified Service-Disabled Veteran-Owned Business, AbleVets has a long-standing commitment to innovating care and services for Veterans and servicemembers through our work for the U.S. Department of Veterans Affairs and Department of Defense (DoD).

Can Am Consulting

Can Am Consulting is a Mahwah, NJ-based company in the Computers and Electronics sector.

RCO

RCO is a Santa Monica, CA-based company in the Computers and Electronics sector.

Teamcor

Teamcor is a Warner Robins, GA-based company in the Computers and Electronics sector.

Advanced Cyber Security

Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.