| Name | Title | Contact Details |
|---|
Voice Trust is a global provider of voice biometrics solutions that enable highly secure and convenient authentication. Our voice biometrics solutions are trusted by industry leaders to prevent identity theft, protect access to business and consumer applications, and deliver a more enjoyable user authentication experience. Fortune Global 500 organizations rely on our over 10 years of voice biometrics authentication experience and successful track record to securely and remotely verify the identity of their users. We are ISO 9001 and Common Criteria certified for the delivery of quality voice biometric solutions consulting, solution deployments, and customer support. Our voice-based identity verification solutions are used by banks, insurance companies, call centers, hospitals, and Telcos across North America, Europe, and the Middle East. VoiceTrust is owned by Dutch private equity firm Ramphastos Investments and headquartered in Toronto, Canada with additional offices in the USA, Germany, Netherlands, and United Arab Emirates.
i2i Population Health is a leader, pioneer and 16-year success story in providing Population Health Management and Analytics solutions. Over the past 16 years, our mission statement, “Creating Healthier Populations,” has consistently guided our product and service development and we have never wavered from that commitment. Each of us at i2i Population Health is dedicated to helping healthcare organizations like yours make the best use of data through smart technology that supports easier and greater access to data and improves the efficiency of your care team. The result is higher quality care for your patients and increased revenue for your organization. Serving more than 2,500 healthcare organizations across 36 states, our clients include health center-controlled networks, primary care associations, physician group practices, hospitals, medical colleges, large employers, community health centers, public health departments and health plans.
Ntegrated Solutions` management team is currently comprised of the company`s founder and CEO, the COO, and the CTO. The management team has extensive knowledge in information technology, IP telephony, the computer industry, and a combined 40+ years of experience in telecommunications. Ntegrated`s members have been involved in the construction process of many companies including Cox Communications, Shell Offshore, AT&T Wireless, Broadwing Communications, and T-Mobile (Voicestream wireless).
Business is a journey. And the roadmap to success is never a straight line. Through creative solutions and problem solving, our team enables yours to plan, build, and transform on your path from good to great. Then we leave you better. You have key business objectives to meet and our technology agnostic and partnership-based approach allows us to effectively help you achieve those goals. From strategy to transformation, your journey is unique, so you deserve a technology solution that is tailored to you.
Advanced Cyber Security is a pioneer in endpoint security, with patented, proactive security solutions that stop advanced persistent threats in their initial stages and prevent advancement. Its products provide a first line of defense to a companys layered security protocol and protects the vulnerable endpoint from exposing sensitive information such as login credentials and private company information that can lead to a costly data or network breach. Advanced Cyber Securitys Multi Out-Of-Band Authentication with patented, true out-of-band authentications is currently used in multiple complex environments. Advanced Cyber Securitys EndpointLock product, which will be integrated into McAfee ePolicy Orchestrator, provides important desktop protection features. The keystroke encryption feature encrypts every keystroke at the point of origin to mitigate the risk of undetected keylogging malware from stealing corporate credentials and sensitive data. An anti-screen scraping technology prevents software from taking screen shots of a users desktop, and the kernel compromise feature monitors the operating system kernel to prevent compromises.