| Name | Title | Contact Details |
|---|
Defiant is the industry leader in website security. We provide software and services to millions of website owners to protect their reputations, customer data and their businesses.
Founded in 1999, Digital Defense is the premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. Our dedicated team of experts helps organizations establish an effective culture of security and embrace the best practices of information security. Through regular assessments, awareness education and rapid reaction to potential threats, our clients become better prepared to reduce risk and keep their information, intellectual property and reputations secure. Network and Environmental Security Assessments Assessments are a cornerstone to an effective information security program. DDI offers vulnerability scanning, penetration testing, web application testing, social engineering and additional security assessments. The combination of DDI’s certified Security Analysts, patent-pending scanning technology and proprietary cloud-based vulnerability system, Frontline Solutions Platform (FSP), delivers the most powerful assessment results and remediation management solutions possible. In addition, the recent integration of DDI and Veracode’s cloud-based platforms enables the delivery of breakthrough Security Risk Assessment solutions.
Bitera Corporation is a Tenafly, NJ-based company in the Computers and Electronics sector.
Network Critical Solutions Limited is a Buffalo, NY-based company in the Computers and Electronics sector.
Digital Shadows monitors and manages an organization`s digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. The Digital Shadows SearchLightâ„¢ service combines scalable data analytics with human data analysts to manage and mitigate risks of an organization`s brand exposure, VIP exposure, cyber threat, data exposure, infrastructure exposure, physical threat, and third party risk, and create an up-to-the minute view of an organization`s digital risk with tailored threat intelligence.