Name | Title | Contact Details |
---|
AdaptiveMobile Security is the world leader in cyber telecoms. Working with operators around the globe and leading security vendors to protect over 2 billion subscribers against advancing attacks.
We think vending machines can do anything. It`s how we`ve always been. It`s why we created the first vending machine to help Union Pacific Railroad distribute its safety supplies, and why today, we`re solving efficiency problems in the halls of the world`s most innovative companies. We`re the global leader in supply vending, serving customers in 34 countries. Among our solutions, we offer two core products, the Smart Station™, a vending machine that stocks keyboards, power cords and a myriad of other work-related supplies and Smart Station Lockers™, for higher-value items, such as laptops. The concept of smart vending is refreshingly simple: empower employees to work smarter and faster, by giving them instant access to the tools they need. The world`s most innovative companies — Facebook, Dropbox, Microsoft, HP, Intel, and Twitter — rely on Smart Stations to help employees be their most creative, collaborative and competitive. Smart Stations transform the way everybody works and come pre-loaded with an unmatched service promise—a lifetime guarantee. Our team collaborates with yours to design a custom solution that solves your biggest productivity slowdowns. We`ve earned the trust of some of the most recognizable names in tech, manufacturing and healthcare because we set the service bar high and keep moving it up.
BLUE RIDGE INTERNATIONAL is a Ranson, WV-based company in the Computers and Electronics sector.
Swarky Solutions, is a Ada, MN-based company in the Computers and Electronics sector.
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.